575
557
safer_gnutls_strerror(ret));
578
if(mc->dh_bits == 0){
579
/* Find out the optimal number of DH bits */
580
/* Try to read the private key file */
581
gnutls_datum_t buffer = { .data = NULL, .size = 0 };
583
int secfile = open(seckeyfilename, O_RDONLY);
584
size_t buffer_capacity = 0;
586
buffer_capacity = incbuffer((char **)&buffer.data,
588
(size_t)buffer_capacity);
589
if(buffer_capacity == 0){
590
perror_plus("incbuffer");
595
ssize_t bytes_read = read(secfile, buffer.data + buffer.size,
601
/* check bytes_read for failure */
608
buffer.size += (unsigned int)bytes_read;
612
/* If successful, use buffer to parse private key */
613
gnutls_sec_param_t sec_param = GNUTLS_SEC_PARAM_ULTRA;
614
if(buffer.data != NULL){
616
gnutls_openpgp_privkey_t privkey = NULL;
617
ret = gnutls_openpgp_privkey_init(&privkey);
618
if(ret != GNUTLS_E_SUCCESS){
619
fprintf_plus(stderr, "Error initializing OpenPGP key"
620
" structure: %s", safer_gnutls_strerror(ret));
624
ret = gnutls_openpgp_privkey_import(privkey, &buffer,
625
GNUTLS_OPENPGP_FMT_BASE64,
627
if(ret != GNUTLS_E_SUCCESS){
628
fprintf_plus(stderr, "Error importing OpenPGP key : %s",
629
safer_gnutls_strerror(ret));
635
/* Use private key to suggest an appropriate sec_param */
636
sec_param = gnutls_openpgp_privkey_sec_param(privkey);
637
gnutls_openpgp_privkey_deinit(privkey);
639
fprintf_plus(stderr, "This OpenPGP key implies using a"
640
" GnuTLS security parameter \"%s\".\n",
641
safe_string(gnutls_sec_param_get_name
647
if(sec_param == GNUTLS_SEC_PARAM_UNKNOWN){
648
/* Err on the side of caution */
649
sec_param = GNUTLS_SEC_PARAM_ULTRA;
651
fprintf_plus(stderr, "Falling back to security parameter"
653
safe_string(gnutls_sec_param_get_name
658
uret = gnutls_sec_param_to_pk_bits(GNUTLS_PK_DH, sec_param);
662
fprintf_plus(stderr, "A \"%s\" GnuTLS security parameter"
663
" implies %u DH bits; using that.\n",
664
safe_string(gnutls_sec_param_get_name
669
fprintf_plus(stderr, "Failed to get implied number of DH"
670
" bits for security parameter \"%s\"): %s\n",
671
safe_string(gnutls_sec_param_get_name(sec_param)),
672
safer_gnutls_strerror(ret));
676
fprintf_plus(stderr, "DH bits explicitly set to %u\n",
679
560
ret = gnutls_dh_params_generate2(mc->dh_params, mc->dh_bits);
680
561
if(ret != GNUTLS_E_SUCCESS){
681
fprintf_plus(stderr, "Error in GnuTLS prime generation (%u bits):"
682
" %s\n", mc->dh_bits, safer_gnutls_strerror(ret));
562
fprintf_plus(stderr, "Error in GnuTLS prime generation: %s\n",
563
safer_gnutls_strerror(ret));
757
638
static void empty_log(__attribute__((unused)) AvahiLogLevel level,
758
639
__attribute__((unused)) const char *txt){}
760
/* Set effective uid to 0, return errno */
761
__attribute__((warn_unused_result))
762
error_t raise_privileges(void){
763
error_t old_errno = errno;
764
error_t ret_errno = 0;
765
if(seteuid(0) == -1){
772
/* Set effective and real user ID to 0. Return errno. */
773
__attribute__((warn_unused_result))
774
error_t raise_privileges_permanently(void){
775
error_t old_errno = errno;
776
error_t ret_errno = raise_privileges();
788
/* Set effective user ID to unprivileged saved user ID */
789
__attribute__((warn_unused_result))
790
error_t lower_privileges(void){
791
error_t old_errno = errno;
792
error_t ret_errno = 0;
793
if(seteuid(uid) == -1){
800
/* Lower privileges permanently */
801
__attribute__((warn_unused_result))
802
error_t lower_privileges_permanently(void){
803
error_t old_errno = errno;
804
error_t ret_errno = 0;
805
if(setuid(uid) == -1){
812
/* Helper function to add_local_route() and delete_local_route() */
813
__attribute__((nonnull, warn_unused_result))
814
static bool add_delete_local_route(const bool add,
816
AvahiIfIndex if_index){
818
char helper[] = "mandos-client-iprouteadddel";
819
char add_arg[] = "add";
820
char delete_arg[] = "delete";
821
char debug_flag[] = "--debug";
822
char *pluginhelperdir = getenv("MANDOSPLUGINHELPERDIR");
823
if(pluginhelperdir == NULL){
825
fprintf_plus(stderr, "MANDOSPLUGINHELPERDIR environment"
826
" variable not set; cannot run helper\n");
831
char interface[IF_NAMESIZE];
832
if(if_indextoname((unsigned int)if_index, interface) == NULL){
833
perror_plus("if_indextoname");
837
int devnull = (int)TEMP_FAILURE_RETRY(open("/dev/null", O_RDONLY));
839
perror_plus("open(\"/dev/null\", O_RDONLY)");
845
/* Raise privileges */
846
errno = raise_privileges_permanently();
848
perror_plus("Failed to raise privileges");
849
/* _exit(EX_NOPERM); */
855
perror_plus("setgid");
858
/* Reset supplementary groups */
860
ret = setgroups(0, NULL);
862
perror_plus("setgroups");
866
ret = dup2(devnull, STDIN_FILENO);
868
perror_plus("dup2(devnull, STDIN_FILENO)");
871
ret = (int)TEMP_FAILURE_RETRY(close(devnull));
873
perror_plus("close");
876
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
878
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
881
int helperdir_fd = (int)TEMP_FAILURE_RETRY(open(pluginhelperdir,
886
if(helperdir_fd == -1){
888
_exit(EX_UNAVAILABLE);
890
int helper_fd = (int)TEMP_FAILURE_RETRY(openat(helperdir_fd,
893
perror_plus("openat");
894
_exit(EX_UNAVAILABLE);
896
TEMP_FAILURE_RETRY(close(helperdir_fd));
898
#pragma GCC diagnostic push
899
#pragma GCC diagnostic ignored "-Wcast-qual"
901
if(fexecve(helper_fd, (char *const [])
902
{ helper, add ? add_arg : delete_arg, (char *)address,
903
interface, debug ? debug_flag : NULL, NULL },
906
#pragma GCC diagnostic pop
908
perror_plus("fexecve");
920
pret = waitpid(pid, &status, 0);
921
if(pret == -1 and errno == EINTR and quit_now){
922
int errno_raising = 0;
923
if((errno = raise_privileges()) != 0){
924
errno_raising = errno;
925
perror_plus("Failed to raise privileges in order to"
926
" kill helper program");
928
if(kill(pid, SIGTERM) == -1){
931
if((errno_raising == 0) and (errno = lower_privileges()) != 0){
932
perror_plus("Failed to lower privileges after killing"
937
} while(pret == -1 and errno == EINTR);
939
perror_plus("waitpid");
942
if(WIFEXITED(status)){
943
if(WEXITSTATUS(status) != 0){
944
fprintf_plus(stderr, "Error: iprouteadddel exited"
945
" with status %d\n", WEXITSTATUS(status));
950
if(WIFSIGNALED(status)){
951
fprintf_plus(stderr, "Error: iprouteadddel died by"
952
" signal %d\n", WTERMSIG(status));
955
fprintf_plus(stderr, "Error: iprouteadddel crashed\n");
959
__attribute__((nonnull, warn_unused_result))
960
static bool add_local_route(const char *address,
961
AvahiIfIndex if_index){
963
fprintf_plus(stderr, "Adding route to %s\n", address);
965
return add_delete_local_route(true, address, if_index);
968
__attribute__((nonnull, warn_unused_result))
969
static bool delete_local_route(const char *address,
970
AvahiIfIndex if_index){
972
fprintf_plus(stderr, "Removing route to %s\n", address);
974
return add_delete_local_route(false, address, if_index);
977
641
/* Called when a Mandos server is found */
978
642
__attribute__((nonnull, warn_unused_result))
979
643
static int start_mandos_communication(const char *ip, in_port_t port,
1149
812
goto mandos_end;
1154
ret = connect(tcp_sd, (struct sockaddr *)&to,
1155
sizeof(struct sockaddr_in6));
1157
ret = connect(tcp_sd, (struct sockaddr *)&to, /* IPv4 */
1158
sizeof(struct sockaddr_in));
1161
if(errno == ENETUNREACH
1162
and if_index != AVAHI_IF_UNSPEC
1163
and connect_to == NULL
1164
and not route_added and
1165
((af == AF_INET6 and not
1166
IN6_IS_ADDR_LINKLOCAL(&(((struct sockaddr_in6 *)
1168
or (af == AF_INET and
1169
/* Not a a IPv4LL address */
1170
(ntohl(((struct sockaddr_in *)&to)->sin_addr.s_addr)
1171
& 0xFFFF0000L) != 0xA9FE0000L))){
1172
/* Work around Avahi bug - Avahi does not announce link-local
1173
addresses if it has a global address, so local hosts with
1174
*only* a link-local address (e.g. Mandos clients) cannot
1175
connect to a Mandos server announced by Avahi on a server
1176
host with a global address. Work around this by retrying
1177
with an explicit route added with the server's address.
1179
Avahi bug reference:
1180
http://lists.freedesktop.org/archives/avahi/2010-February/001833.html
1181
https://bugs.debian.org/587961
1184
fprintf_plus(stderr, "Mandos server unreachable, trying"
1188
route_added = add_local_route(ip, if_index);
1194
if(errno != ECONNREFUSED or debug){
1196
perror_plus("connect");
816
ret = connect(tcp_sd, (struct sockaddr *)&to,
817
sizeof(struct sockaddr_in6));
819
ret = connect(tcp_sd, (struct sockaddr *)&to, /* IPv4 */
820
sizeof(struct sockaddr_in));
823
if((errno != ECONNREFUSED and errno != ENETUNREACH) or debug){
825
perror_plus("connect");
1209
836
const char *out = mandos_protocol_version;
1460
/* Set effective uid to 0, return errno */
1461
__attribute__((warn_unused_result))
1462
error_t raise_privileges(void){
1463
error_t old_errno = errno;
1464
error_t ret_errno = 0;
1465
if(seteuid(0) == -1){
1467
perror_plus("seteuid");
1473
/* Set effective and real user ID to 0. Return errno. */
1474
__attribute__((warn_unused_result))
1475
error_t raise_privileges_permanently(void){
1476
error_t old_errno = errno;
1477
error_t ret_errno = raise_privileges();
1482
if(setuid(0) == -1){
1484
perror_plus("seteuid");
1490
/* Set effective user ID to unprivileged saved user ID */
1491
__attribute__((warn_unused_result))
1492
error_t lower_privileges(void){
1493
error_t old_errno = errno;
1494
error_t ret_errno = 0;
1495
if(seteuid(uid) == -1){
1497
perror_plus("seteuid");
1503
/* Lower privileges permanently */
1504
__attribute__((warn_unused_result))
1505
error_t lower_privileges_permanently(void){
1506
error_t old_errno = errno;
1507
error_t ret_errno = 0;
1508
if(setuid(uid) == -1){
1510
perror_plus("setuid");
1832
1516
__attribute__((nonnull))
1833
1517
void run_network_hooks(const char *mode, const char *interface,
1834
1518
const float delay){
1835
struct dirent **direntries = NULL;
1836
if(hookdir_fd == -1){
1837
hookdir_fd = open(hookdir, O_RDONLY | O_DIRECTORY | O_PATH
1839
if(hookdir_fd == -1){
1840
if(errno == ENOENT){
1842
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1843
" found\n", hookdir);
1846
perror_plus("open");
1852
#if __GLIBC_PREREQ(2, 15)
1853
int numhooks = scandirat(hookdir_fd, ".", &direntries,
1854
runnable_hook, alphasort);
1855
#else /* not __GLIBC_PREREQ(2, 15) */
1856
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1858
#endif /* not __GLIBC_PREREQ(2, 15) */
1859
#else /* not __GLIBC__ */
1860
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1862
#endif /* not __GLIBC__ */
1519
struct dirent **direntries;
1520
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1863
1522
if(numhooks == -1){
1864
perror_plus("scandir");
1867
struct dirent *direntry;
1869
int devnull = (int)TEMP_FAILURE_RETRY(open("/dev/null", O_RDONLY));
1871
perror_plus("open(\"/dev/null\", O_RDONLY)");
1874
for(int i = 0; i < numhooks; i++){
1875
direntry = direntries[i];
1877
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1523
if(errno == ENOENT){
1525
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1526
" found\n", hookdir);
1529
perror_plus("scandir");
1880
pid_t hook_pid = fork();
1883
/* Raise privileges */
1884
errno = raise_privileges_permanently();
1886
perror_plus("Failed to raise privileges");
1893
perror_plus("setgid");
1896
/* Reset supplementary groups */
1898
ret = setgroups(0, NULL);
1900
perror_plus("setgroups");
1903
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1905
perror_plus("setenv");
1908
ret = setenv("DEVICE", interface, 1);
1910
perror_plus("setenv");
1913
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1915
perror_plus("setenv");
1918
ret = setenv("MODE", mode, 1);
1920
perror_plus("setenv");
1924
ret = asprintf(&delaystring, "%f", (double)delay);
1532
struct dirent *direntry;
1534
int devnull = open("/dev/null", O_RDONLY);
1535
for(int i = 0; i < numhooks; i++){
1536
direntry = direntries[i];
1537
char *fullname = NULL;
1538
ret = asprintf(&fullname, "%s/%s", hookdir, direntry->d_name);
1926
1540
perror_plus("asprintf");
1929
ret = setenv("DELAY", delaystring, 1);
1544
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1547
pid_t hook_pid = fork();
1550
/* Raise privileges */
1551
if(raise_privileges_permanently() != 0){
1552
perror_plus("Failed to raise privileges");
1559
perror_plus("setgid");
1562
/* Reset supplementary groups */
1564
ret = setgroups(0, NULL);
1566
perror_plus("setgroups");
1569
ret = dup2(devnull, STDIN_FILENO);
1571
perror_plus("dup2(devnull, STDIN_FILENO)");
1574
ret = close(devnull);
1576
perror_plus("close");
1579
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
1581
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
1584
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1586
perror_plus("setenv");
1589
ret = setenv("DEVICE", interface, 1);
1591
perror_plus("setenv");
1594
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1596
perror_plus("setenv");
1599
ret = setenv("MODE", mode, 1);
1601
perror_plus("setenv");
1605
ret = asprintf(&delaystring, "%f", (double)delay);
1607
perror_plus("asprintf");
1610
ret = setenv("DELAY", delaystring, 1);
1613
perror_plus("setenv");
1931
1616
free(delaystring);
1932
perror_plus("setenv");
1936
if(connect_to != NULL){
1937
ret = setenv("CONNECT", connect_to, 1);
1939
perror_plus("setenv");
1943
int hook_fd = (int)TEMP_FAILURE_RETRY(openat(hookdir_fd,
1947
perror_plus("openat");
1948
_exit(EXIT_FAILURE);
1950
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1951
perror_plus("close");
1952
_exit(EXIT_FAILURE);
1954
ret = dup2(devnull, STDIN_FILENO);
1956
perror_plus("dup2(devnull, STDIN_FILENO)");
1959
ret = (int)TEMP_FAILURE_RETRY(close(devnull));
1961
perror_plus("close");
1964
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
1966
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
1969
if(fexecve(hook_fd, (char *const []){ direntry->d_name, NULL },
1971
perror_plus("fexecve");
1972
_exit(EXIT_FAILURE);
1976
perror_plus("fork");
1981
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1982
perror_plus("waitpid");
1986
if(WIFEXITED(status)){
1987
if(WEXITSTATUS(status) != 0){
1988
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1989
" with status %d\n", direntry->d_name,
1990
WEXITSTATUS(status));
1994
} else if(WIFSIGNALED(status)){
1995
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1996
" signal %d\n", direntry->d_name,
1617
if(connect_to != NULL){
1618
ret = setenv("CONNECT", connect_to, 1);
1620
perror_plus("setenv");
1624
if(execl(fullname, direntry->d_name, mode, NULL) == -1){
1625
perror_plus("execl");
1626
_exit(EXIT_FAILURE);
2001
fprintf_plus(stderr, "Warning: network hook \"%s\""
2002
" crashed\n", direntry->d_name);
2008
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
2014
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
2015
perror_plus("close");
1630
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1631
perror_plus("waitpid");
1635
if(WIFEXITED(status)){
1636
if(WEXITSTATUS(status) != 0){
1637
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1638
" with status %d\n", direntry->d_name,
1639
WEXITSTATUS(status));
1643
} else if(WIFSIGNALED(status)){
1644
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1645
" signal %d\n", direntry->d_name,
1650
fprintf_plus(stderr, "Warning: network hook \"%s\""
1651
" crashed\n", direntry->d_name);
1658
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
2022
1666
__attribute__((nonnull, warn_unused_result))
2948
2576
/* Removes the GPGME temp directory and all files inside */
2949
2577
if(tempdir != NULL){
2950
2578
struct dirent **direntries = NULL;
2951
int tempdir_fd = (int)TEMP_FAILURE_RETRY(open(tempdir, O_RDONLY
2955
if(tempdir_fd == -1){
2956
perror_plus("open");
2959
#if __GLIBC_PREREQ(2, 15)
2960
int numentries = scandirat(tempdir_fd, ".", &direntries,
2961
notdotentries, alphasort);
2962
#else /* not __GLIBC_PREREQ(2, 15) */
2963
int numentries = scandir(tempdir, &direntries, notdotentries,
2965
#endif /* not __GLIBC_PREREQ(2, 15) */
2966
#else /* not __GLIBC__ */
2967
int numentries = scandir(tempdir, &direntries, notdotentries,
2969
#endif /* not __GLIBC__ */
2970
if(numentries >= 0){
2971
for(int i = 0; i < numentries; i++){
2972
ret = unlinkat(tempdir_fd, direntries[i]->d_name, 0);
2974
fprintf_plus(stderr, "unlinkat(open(\"%s\", O_RDONLY),"
2975
" \"%s\", 0): %s\n", tempdir,
2976
direntries[i]->d_name, strerror(errno));
2978
free(direntries[i]);
2981
/* need to clean even if 0 because man page doesn't specify */
2983
if(numentries == -1){
2984
perror_plus("scandir");
2986
ret = rmdir(tempdir);
2987
if(ret == -1 and errno != ENOENT){
2988
perror_plus("rmdir");
2579
struct dirent *direntry = NULL;
2580
int numentries = scandir(tempdir, &direntries, notdotentries,
2583
for(int i = 0; i < numentries; i++){
2584
direntry = direntries[i];
2585
char *fullname = NULL;
2586
ret = asprintf(&fullname, "%s/%s", tempdir,
2589
perror_plus("asprintf");
2592
ret = remove(fullname);
2594
fprintf_plus(stderr, "remove(\"%s\"): %s\n", fullname,
2991
TEMP_FAILURE_RETRY(close(tempdir_fd));
2601
/* need to clean even if 0 because man page doesn't specify */
2603
if(numentries == -1){
2604
perror_plus("scandir");
2606
ret = rmdir(tempdir);
2607
if(ret == -1 and errno != ENOENT){
2608
perror_plus("rmdir");