236
224
perror_plus("strdup");
239
ret = clock_gettime(CLOCK_MONOTONIC, &(new_server->last_seen));
241
perror_plus("clock_gettime");
244
227
/* Special case of first server */
245
228
if(*current_server == NULL){
246
229
new_server->next = new_server;
247
230
new_server->prev = new_server;
248
231
*current_server = new_server;
232
/* Place the new server last in the list */
250
/* Place the new server last in the list */
251
234
new_server->next = *current_server;
252
235
new_server->prev = (*current_server)->prev;
253
236
new_server->prev->next = new_server;
254
237
(*current_server)->prev = new_server;
239
ret = clock_gettime(CLOCK_MONOTONIC, &(*current_server)->last_seen);
241
perror_plus("clock_gettime");
260
248
* Initialize GPGME.
262
__attribute__((nonnull, warn_unused_result))
263
static bool init_gpgme(const char * const seckey,
264
const char * const pubkey,
265
const char * const tempdir,
250
static bool init_gpgme(const char *seckey, const char *pubkey,
251
const char *tempdir, mandos_context *mc){
267
252
gpgme_error_t rc;
268
253
gpgme_engine_info_t engine_info;
271
256
* Helper function to insert pub and seckey to the engine keyring.
273
bool import_key(const char * const filename){
258
bool import_key(const char *filename){
276
261
gpgme_data_t pgp_data;
790
779
char addrstr[(INET_ADDRSTRLEN > INET6_ADDRSTRLEN) ?
791
780
INET_ADDRSTRLEN : INET6_ADDRSTRLEN] = "";
792
782
if(af == AF_INET6){
793
ret = getnameinfo((struct sockaddr *)&to,
794
sizeof(struct sockaddr_in6),
795
addrstr, sizeof(addrstr), NULL, 0,
783
pcret = inet_ntop(af, &(to.in6.sin6_addr), addrstr,
798
ret = getnameinfo((struct sockaddr *)&to,
799
sizeof(struct sockaddr_in),
800
addrstr, sizeof(addrstr), NULL, 0,
786
pcret = inet_ntop(af, &(to.in.sin_addr), addrstr,
803
if(ret == EAI_SYSTEM){
804
perror_plus("getnameinfo");
805
} else if(ret != 0) {
806
fprintf_plus(stderr, "getnameinfo: %s", gai_strerror(ret));
807
} else if(strcmp(addrstr, ip) != 0){
808
fprintf_plus(stderr, "Canonical address form: %s\n", addrstr);
790
perror_plus("inet_ntop");
792
if(strcmp(addrstr, ip) != 0){
793
fprintf_plus(stderr, "Canonical address form: %s\n", addrstr);
1507
1485
return ret_errno;
1512
* Based on the example in the GNU LibC manual chapter 13.13 "File
1513
* Descriptor Flags".
1514
| [[info:libc:Descriptor%20Flags][File Descriptor Flags]] |
1516
__attribute__((warn_unused_result))
1517
static int set_cloexec_flag(int fd){
1518
int ret = (int)TEMP_FAILURE_RETRY(fcntl(fd, F_GETFD, 0));
1519
/* If reading the flags failed, return error indication now. */
1523
/* Store modified flag word in the descriptor. */
1524
return (int)TEMP_FAILURE_RETRY(fcntl(fd, F_SETFD,
1527
#endif /* not O_CLOEXEC */
1529
__attribute__((nonnull))
1530
void run_network_hooks(const char *mode, const char *interface,
1488
bool run_network_hooks(const char *mode, const char *interface,
1531
1489
const float delay){
1532
1490
struct dirent **direntries;
1533
if(hookdir_fd == -1){
1534
hookdir_fd = open(hookdir, O_RDONLY |
1537
#else /* not O_CLOEXEC */
1539
#endif /* not O_CLOEXEC */
1541
if(hookdir_fd == -1){
1542
if(errno == ENOENT){
1544
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1545
" found\n", hookdir);
1548
perror_plus("open");
1553
if(set_cloexec_flag(hookdir_fd) < 0){
1554
perror_plus("set_cloexec_flag");
1555
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1556
perror_plus("close");
1562
#endif /* not O_CLOEXEC */
1565
#if __GLIBC_PREREQ(2, 15)
1566
int numhooks = scandirat(hookdir_fd, ".", &direntries,
1567
runnable_hook, alphasort);
1568
#else /* not __GLIBC_PREREQ(2, 15) */
1569
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1571
#endif /* not __GLIBC_PREREQ(2, 15) */
1572
#else /* not __GLIBC__ */
1573
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1575
#endif /* not __GLIBC__ */
1491
struct dirent *direntry;
1493
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1576
1495
if(numhooks == -1){
1577
perror_plus("scandir");
1580
struct dirent *direntry;
1582
int devnull = open("/dev/null", O_RDONLY);
1583
for(int i = 0; i < numhooks; i++){
1584
direntry = direntries[i];
1586
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1496
if(errno == ENOENT){
1498
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1499
" found\n", hookdir);
1502
perror_plus("scandir");
1589
pid_t hook_pid = fork();
1592
/* Raise privileges */
1593
if(raise_privileges_permanently() != 0){
1594
perror_plus("Failed to raise privileges");
1601
perror_plus("setgid");
1604
/* Reset supplementary groups */
1606
ret = setgroups(0, NULL);
1608
perror_plus("setgroups");
1611
ret = dup2(devnull, STDIN_FILENO);
1613
perror_plus("dup2(devnull, STDIN_FILENO)");
1616
ret = close(devnull);
1618
perror_plus("close");
1621
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
1623
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
1626
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1628
perror_plus("setenv");
1631
ret = setenv("DEVICE", interface, 1);
1633
perror_plus("setenv");
1636
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1638
perror_plus("setenv");
1641
ret = setenv("MODE", mode, 1);
1643
perror_plus("setenv");
1647
ret = asprintf(&delaystring, "%f", (double)delay);
1505
int devnull = open("/dev/null", O_RDONLY);
1506
for(int i = 0; i < numhooks; i++){
1507
direntry = direntries[i];
1508
char *fullname = NULL;
1509
ret = asprintf(&fullname, "%s/%s", hookdir, direntry->d_name);
1649
1511
perror_plus("asprintf");
1652
ret = setenv("DELAY", delaystring, 1);
1515
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1518
pid_t hook_pid = fork();
1521
/* Raise privileges */
1522
raise_privileges_permanently();
1527
perror_plus("setgid");
1529
/* Reset supplementary groups */
1531
ret = setgroups(0, NULL);
1533
perror_plus("setgroups");
1535
dup2(devnull, STDIN_FILENO);
1537
dup2(STDERR_FILENO, STDOUT_FILENO);
1538
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1540
perror_plus("setenv");
1543
ret = setenv("DEVICE", interface, 1);
1545
perror_plus("setenv");
1548
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1550
perror_plus("setenv");
1553
ret = setenv("MODE", mode, 1);
1555
perror_plus("setenv");
1559
ret = asprintf(&delaystring, "%f", delay);
1561
perror_plus("asprintf");
1564
ret = setenv("DELAY", delaystring, 1);
1567
perror_plus("setenv");
1654
1570
free(delaystring);
1655
perror_plus("setenv");
1659
if(connect_to != NULL){
1660
ret = setenv("CONNECT", connect_to, 1);
1662
perror_plus("setenv");
1666
if(fexecve(hookdir_fd, (char *const [])
1667
{ direntry->d_name, NULL }, environ) == -1){
1668
perror_plus("fexecve");
1669
_exit(EXIT_FAILURE);
1673
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1674
perror_plus("waitpid");
1677
if(WIFEXITED(status)){
1678
if(WEXITSTATUS(status) != 0){
1679
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1680
" with status %d\n", direntry->d_name,
1681
WEXITSTATUS(status));
1684
} else if(WIFSIGNALED(status)){
1685
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1686
" signal %d\n", direntry->d_name,
1571
if(connect_to != NULL){
1572
ret = setenv("CONNECT", connect_to, 1);
1574
perror_plus("setenv");
1578
if(execl(fullname, direntry->d_name, mode, NULL) == -1){
1579
perror_plus("execl");
1580
_exit(EXIT_FAILURE);
1690
fprintf_plus(stderr, "Warning: network hook \"%s\""
1691
" crashed\n", direntry->d_name);
1696
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1700
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1701
perror_plus("close");
1584
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1585
perror_plus("waitpid");
1589
if(WIFEXITED(status)){
1590
if(WEXITSTATUS(status) != 0){
1591
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1592
" with status %d\n", direntry->d_name,
1593
WEXITSTATUS(status));
1597
} else if(WIFSIGNALED(status)){
1598
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1599
" signal %d\n", direntry->d_name,
1604
fprintf_plus(stderr, "Warning: network hook \"%s\""
1605
" crashed\n", direntry->d_name);
1612
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1708
__attribute__((nonnull, warn_unused_result))
1709
1621
error_t bring_up_interface(const char *const interface,
1710
1622
const float delay){
1711
1624
error_t old_errno = errno;
1625
error_t ret_errno = 0;
1626
int ret, ret_setflags;
1713
1627
struct ifreq network;
1714
1628
unsigned int if_index = if_nametoindex(interface);
1715
1629
if(if_index == 0){
2579
/* Re-raise privileges */
2449
/* Re-raise priviliges */
2581
ret_errno = raise_privileges();
2583
perror_plus("Failed to raise privileges");
2586
/* Run network hooks */
2587
run_network_hooks("stop", interfaces_hooks != NULL ?
2588
interfaces_hooks : "", delay);
2590
/* Take down the network interfaces which were brought up */
2592
char *interface = NULL;
2593
while((interface=argz_next(interfaces_to_take_down,
2594
interfaces_to_take_down_size,
2596
ret_errno = take_down_interface(interface);
2599
perror_plus("Failed to take down interface");
2602
if(debug and (interfaces_to_take_down == NULL)){
2603
fprintf_plus(stderr, "No interfaces needed to be taken"
2609
ret_errno = lower_privileges_permanently();
2611
perror_plus("Failed to lower privileges permanently");
2453
/* Run network hooks */
2454
run_network_hooks("stop", interfaces_hooks != NULL ?
2455
interfaces_hooks : "", delay);
2457
/* Take down the network interfaces which were brought up */
2459
char *interface = NULL;
2460
while((interface=argz_next(interfaces_to_take_down,
2461
interfaces_to_take_down_size,
2463
ret_errno = take_down_interface(interface);
2466
perror_plus("Failed to take down interface");
2469
if(debug and (interfaces_to_take_down == NULL)){
2470
fprintf_plus(stderr, "No interfaces needed to be taken"
2475
lower_privileges_permanently();
2615
2478
free(interfaces_to_take_down);
2616
2479
free(interfaces_hooks);
2618
2481
/* Removes the GPGME temp directory and all files inside */
2619
if(tempdir != NULL){
2482
if(tempdir_created){
2620
2483
struct dirent **direntries = NULL;
2621
int tempdir_fd = (int)TEMP_FAILURE_RETRY(open(tempdir, O_RDONLY));
2622
if(tempdir_fd == -1){
2623
perror_plus("open");
2626
#if __GLIBC_PREREQ(2, 15)
2627
int numentries = scandirat(tempdir_fd, ".", &direntries,
2628
notdotentries, alphasort);
2629
#else /* not __GLIBC_PREREQ(2, 15) */
2630
int numentries = scandir(tempdir, &direntries, notdotentries,
2632
#endif /* not __GLIBC_PREREQ(2, 15) */
2633
#else /* not __GLIBC__ */
2634
int numentries = scandir(tempdir, &direntries, notdotentries,
2636
#endif /* not __GLIBC__ */
2638
for(int i = 0; i < numentries; i++){
2639
ret = unlinkat(tempdir_fd, direntries[i]->d_name, 0);
2641
fprintf_plus(stderr, "unlinkat(open(\"%s\", O_RDONLY),"
2642
" \"%s\", 0): %s\n", tempdir,
2643
direntries[i]->d_name, strerror(errno));
2647
/* need to clean even if 0 because man page doesn't specify */
2649
if(numentries == -1){
2650
perror_plus("scandir");
2652
ret = rmdir(tempdir);
2653
if(ret == -1 and errno != ENOENT){
2654
perror_plus("rmdir");
2484
struct dirent *direntry = NULL;
2485
int numentries = scandir(tempdir, &direntries, notdotentries,
2487
if (numentries > 0){
2488
for(int i = 0; i < numentries; i++){
2489
direntry = direntries[i];
2490
char *fullname = NULL;
2491
ret = asprintf(&fullname, "%s/%s", tempdir,
2494
perror_plus("asprintf");
2497
ret = remove(fullname);
2499
fprintf_plus(stderr, "remove(\"%s\"): %s\n", fullname,
2657
TEMP_FAILURE_RETRY(close(tempdir_fd));
2506
/* need to clean even if 0 because man page doesn't specify */
2508
if (numentries == -1){
2509
perror_plus("scandir");
2511
ret = rmdir(tempdir);
2512
if(ret == -1 and errno != ENOENT){
2513
perror_plus("rmdir");