538
554
/* GnuTLS server initialization */
539
ret = gnutls_dh_params_init(&mc.dh_params);
555
ret = gnutls_dh_params_init(&mc->dh_params);
540
556
if(ret != GNUTLS_E_SUCCESS){
541
557
fprintf_plus(stderr, "Error in GnuTLS DH parameter"
542
558
" initialization: %s\n",
543
559
safer_gnutls_strerror(ret));
546
ret = gnutls_dh_params_generate2(mc.dh_params, mc.dh_bits);
562
ret = gnutls_dh_params_generate2(mc->dh_params, mc->dh_bits);
547
563
if(ret != GNUTLS_E_SUCCESS){
548
564
fprintf_plus(stderr, "Error in GnuTLS prime generation: %s\n",
549
565
safer_gnutls_strerror(ret));
553
gnutls_certificate_set_dh_params(mc.cred, mc.dh_params);
569
gnutls_certificate_set_dh_params(mc->cred, mc->dh_params);
559
gnutls_certificate_free_credentials(mc.cred);
575
gnutls_certificate_free_credentials(mc->cred);
560
576
gnutls_global_deinit();
561
gnutls_dh_params_deinit(mc.dh_params);
577
gnutls_dh_params_deinit(mc->dh_params);
565
static int init_gnutls_session(gnutls_session_t *session){
581
__attribute__((nonnull, warn_unused_result))
582
static int init_gnutls_session(gnutls_session_t *session,
567
585
/* GnuTLS session creation */
664
ret = init_gnutls_session(&session);
680
/* If the interface is specified and we have a list of interfaces */
681
if(if_index != AVAHI_IF_UNSPEC and mc->interfaces != NULL){
682
/* Check if the interface is one of the interfaces we are using */
685
char *interface = NULL;
686
while((interface=argz_next(mc->interfaces, mc->interfaces_size,
688
if(if_nametoindex(interface) == (unsigned int)if_index){
695
/* This interface does not match any in the list, so we don't
696
connect to the server */
698
char interface[IF_NAMESIZE];
699
if(if_indextoname((unsigned int)if_index, interface) == NULL){
700
perror_plus("if_indextoname");
702
fprintf_plus(stderr, "Skipping server on non-used interface"
704
if_indextoname((unsigned int)if_index,
712
ret = init_gnutls_session(&session, mc);
670
718
fprintf_plus(stderr, "Setting up a TCP connection to %s, port %"
671
PRIu16 "\n", ip, port);
719
PRIuMAX "\n", ip, (uintmax_t)port);
674
722
tcp_sd = socket(pf, SOCK_STREAM, 0);
738
780
if(if_indextoname((unsigned int)if_index, interface) == NULL){
739
781
perror_plus("if_indextoname");
741
fprintf_plus(stderr, "Connection to: %s%%%s, port %" PRIu16
742
"\n", ip, interface, port);
783
fprintf_plus(stderr, "Connection to: %s%%%s, port %" PRIuMAX
784
"\n", ip, interface, (uintmax_t)port);
745
fprintf_plus(stderr, "Connection to: %s, port %" PRIu16 "\n",
787
fprintf_plus(stderr, "Connection to: %s, port %" PRIuMAX "\n",
788
ip, (uintmax_t)port);
748
790
char addrstr[(INET_ADDRSTRLEN > INET6_ADDRSTRLEN) ?
749
791
INET_ADDRSTRLEN : INET6_ADDRSTRLEN] = "";
751
792
if(af == AF_INET6){
752
pcret = inet_ntop(af, &(to.in6.sin6_addr), addrstr,
793
ret = getnameinfo((struct sockaddr *)&to,
794
sizeof(struct sockaddr_in6),
795
addrstr, sizeof(addrstr), NULL, 0,
755
pcret = inet_ntop(af, &(to.in.sin_addr), addrstr,
798
ret = getnameinfo((struct sockaddr *)&to,
799
sizeof(struct sockaddr_in),
800
addrstr, sizeof(addrstr), NULL, 0,
759
perror_plus("inet_ntop");
761
if(strcmp(addrstr, ip) != 0){
762
fprintf_plus(stderr, "Canonical address form: %s\n", addrstr);
803
if(ret == EAI_SYSTEM){
804
perror_plus("getnameinfo");
805
} else if(ret != 0) {
806
fprintf_plus(stderr, "getnameinfo: %s", gai_strerror(ret));
807
} else if(strcmp(addrstr, ip) != 0){
808
fprintf_plus(stderr, "Canonical address form: %s\n", addrstr);
1037
1088
PRIdMAX ") on port %" PRIu16 "\n", name,
1038
1089
host_name, ip, (intmax_t)interface, port);
1040
int ret = start_mandos_communication(ip, port, interface,
1041
avahi_proto_to_af(proto));
1091
int ret = start_mandos_communication(ip, (in_port_t)port,
1093
avahi_proto_to_af(proto),
1043
avahi_simple_poll_quit(mc.simple_poll);
1096
avahi_simple_poll_quit(simple_poll);
1045
if(not add_server(ip, port, interface,
1046
avahi_proto_to_af(proto))){
1098
if(not add_server(ip, (in_port_t)port, interface,
1099
avahi_proto_to_af(proto),
1100
&((mandos_context*)mc)->current_server)){
1047
1101
fprintf_plus(stderr, "Failed to add server \"%s\" to server"
1048
1102
" list\n", name);
1355
1416
- ((intmax_t)waited_time.tv_sec * 1000))
1356
1417
- ((intmax_t)waited_time.tv_nsec / 1000000));
1359
1420
fprintf_plus(stderr, "Blocking for %" PRIdMAX " ms\n",
1363
1424
if(block_time <= 0){
1364
ret = start_mandos_communication(mc.current_server->ip,
1365
mc.current_server->port,
1366
mc.current_server->if_index,
1367
mc.current_server->af);
1425
ret = start_mandos_communication(mc->current_server->ip,
1426
mc->current_server->port,
1427
mc->current_server->if_index,
1428
mc->current_server->af, mc);
1369
avahi_simple_poll_quit(mc.simple_poll);
1430
avahi_simple_poll_quit(s);
1372
1433
ret = clock_gettime(CLOCK_MONOTONIC,
1373
&mc.current_server->last_seen);
1434
&mc->current_server->last_seen);
1375
1436
perror_plus("clock_gettime");
1378
mc.current_server = mc.current_server->next;
1439
mc->current_server = mc->current_server->next;
1379
1440
block_time = 0; /* Call avahi to find new Mandos
1380
1441
servers, but don't block */
1442
1507
return ret_errno;
1445
bool run_network_hooks(const char *mode, const char *interface,
1510
__attribute__((nonnull))
1511
void run_network_hooks(const char *mode, const char *interface,
1446
1512
const float delay){
1447
1513
struct dirent **direntries;
1448
struct dirent *direntry;
1450
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1514
if(hookdir_fd == -1){
1515
hookdir_fd = open(hookdir, O_RDONLY);
1516
if(hookdir_fd == -1){
1517
if(errno == ENOENT){
1519
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1520
" found\n", hookdir);
1523
perror_plus("open");
1529
#if __GLIBC_PREREQ(2, 15)
1530
int numhooks = scandirat(hookdir_fd, ".", &direntries,
1531
runnable_hook, alphasort);
1532
#else /* not __GLIBC_PREREQ(2, 15) */
1533
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1535
#endif /* not __GLIBC_PREREQ(2, 15) */
1536
#else /* not __GLIBC__ */
1537
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1539
#endif /* not __GLIBC__ */
1452
1540
if(numhooks == -1){
1453
1541
perror_plus("scandir");
1455
int devnull = open("/dev/null", O_RDONLY);
1456
for(int i = 0; i < numhooks; i++){
1457
direntry = direntries[i];
1458
char *fullname = NULL;
1459
ret = asprintf(&fullname, "%s/%s", hookdir, direntry->d_name);
1544
struct dirent *direntry;
1546
int devnull = open("/dev/null", O_RDONLY);
1547
for(int i = 0; i < numhooks; i++){
1548
direntry = direntries[i];
1550
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1553
pid_t hook_pid = fork();
1556
/* Raise privileges */
1557
if(raise_privileges_permanently() != 0){
1558
perror_plus("Failed to raise privileges");
1565
perror_plus("setgid");
1568
/* Reset supplementary groups */
1570
ret = setgroups(0, NULL);
1572
perror_plus("setgroups");
1575
ret = dup2(devnull, STDIN_FILENO);
1577
perror_plus("dup2(devnull, STDIN_FILENO)");
1580
ret = close(devnull);
1582
perror_plus("close");
1585
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
1587
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
1590
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1592
perror_plus("setenv");
1595
ret = setenv("DEVICE", interface, 1);
1597
perror_plus("setenv");
1600
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1602
perror_plus("setenv");
1605
ret = setenv("MODE", mode, 1);
1607
perror_plus("setenv");
1611
ret = asprintf(&delaystring, "%f", (double)delay);
1461
1613
perror_plus("asprintf");
1465
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1468
pid_t hook_pid = fork();
1471
/* Raise privileges */
1472
raise_privileges_permanently();
1477
perror_plus("setgid");
1479
/* Reset supplementary groups */
1481
ret = setgroups(0, NULL);
1483
perror_plus("setgroups");
1485
dup2(devnull, STDIN_FILENO);
1487
dup2(STDERR_FILENO, STDOUT_FILENO);
1488
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1490
perror_plus("setenv");
1493
ret = setenv("DEVICE", interface, 1);
1495
perror_plus("setenv");
1498
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1500
perror_plus("setenv");
1503
ret = setenv("MODE", mode, 1);
1505
perror_plus("setenv");
1509
ret = asprintf(&delaystring, "%f", delay);
1511
perror_plus("asprintf");
1514
ret = setenv("DELAY", delaystring, 1);
1517
perror_plus("setenv");
1616
ret = setenv("DELAY", delaystring, 1);
1520
1618
free(delaystring);
1521
if(connect_to != NULL){
1522
ret = setenv("CONNECT", connect_to, 1);
1524
perror_plus("setenv");
1528
if(execl(fullname, direntry->d_name, mode, NULL) == -1){
1529
perror_plus("execl");
1530
_exit(EXIT_FAILURE);
1619
perror_plus("setenv");
1623
if(connect_to != NULL){
1624
ret = setenv("CONNECT", connect_to, 1);
1626
perror_plus("setenv");
1630
int hook_fd = openat(hookdir_fd, direntry->d_name, O_RDONLY);
1632
perror_plus("openat");
1633
_exit(EXIT_FAILURE);
1635
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1636
perror_plus("close");
1637
_exit(EXIT_FAILURE);
1639
if(fexecve(hook_fd, (char *const []){ direntry->d_name, NULL },
1641
perror_plus("fexecve");
1642
_exit(EXIT_FAILURE);
1646
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1647
perror_plus("waitpid");
1650
if(WIFEXITED(status)){
1651
if(WEXITSTATUS(status) != 0){
1652
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1653
" with status %d\n", direntry->d_name,
1654
WEXITSTATUS(status));
1657
} else if(WIFSIGNALED(status)){
1658
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1659
" signal %d\n", direntry->d_name,
1534
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1535
perror_plus("waitpid");
1539
if(WIFEXITED(status)){
1540
if(WEXITSTATUS(status) != 0){
1541
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1542
" with status %d\n", direntry->d_name,
1543
WEXITSTATUS(status));
1547
} else if(WIFSIGNALED(status)){
1548
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1549
" signal %d\n", direntry->d_name,
1554
fprintf_plus(stderr, "Warning: network hook \"%s\""
1555
" crashed\n", direntry->d_name);
1562
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1663
fprintf_plus(stderr, "Warning: network hook \"%s\""
1664
" crashed\n", direntry->d_name);
1669
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1673
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1674
perror_plus("close");
1681
__attribute__((nonnull, warn_unused_result))
1571
1682
error_t bring_up_interface(const char *const interface,
1572
1683
const float delay){
1574
1684
error_t old_errno = errno;
1575
error_t ret_errno = 0;
1576
int ret, ret_setflags;
1577
1686
struct ifreq network;
1578
1687
unsigned int if_index = if_nametoindex(interface);
1579
1688
if(if_index == 0){
1743
1881
int main(int argc, char *argv[]){
1882
mandos_context mc = { .server = NULL, .dh_bits = 1024,
1883
.priority = "SECURE256:!CTYPE-X.509:"
1884
"+CTYPE-OPENPGP", .current_server = NULL,
1885
.interfaces = NULL, .interfaces_size = 0 };
1744
1886
AvahiSServiceBrowser *sb = NULL;
1745
1887
error_t ret_errno;
1747
1889
intmax_t tmpmax;
1749
1891
int exitcode = EXIT_SUCCESS;
1750
char *interfaces = NULL;
1751
size_t interfaces_size = 0;
1752
1892
char *interfaces_to_take_down = NULL;
1753
1893
size_t interfaces_to_take_down_size = 0;
1754
char tempdir[] = "/tmp/mandosXXXXXX";
1755
bool tempdir_created = false;
1894
char run_tempdir[] = "/run/tmp/mandosXXXXXX";
1895
char old_tempdir[] = "/tmp/mandosXXXXXX";
1896
char *tempdir = NULL;
1756
1897
AvahiIfIndex if_index = AVAHI_IF_UNSPEC;
1757
1898
const char *seckey = PATHDIR "/" SECKEY;
1758
1899
const char *pubkey = PATHDIR "/" PUBKEY;
1759
1900
char *interfaces_hooks = NULL;
1760
size_t interfaces_hooks_size = 0;
1762
1902
bool gnutls_initialized = false;
1763
1903
bool gpgme_initialized = false;
2138
/* If we only got one interface, explicitly use only that one */
2139
if(argz_count(interfaces, interfaces_size) == 1){
2141
fprintf_plus(stderr, "Using only interface \"%s\"\n",
2144
if_index = (AvahiIfIndex)if_nametoindex(interfaces);
2147
/* Bring up interfaces which are down */
2148
if(not (argz_count(interfaces, interfaces_size) == 1
2149
and strcmp(interfaces, "none") == 0)){
2284
/* Bring up interfaces which are down, and remove any "none"s */
2150
2286
char *interface = NULL;
2151
while((interface = argz_next(interfaces, interfaces_size,
2287
while((interface = argz_next(mc.interfaces, mc.interfaces_size,
2289
/* If interface name is "none", stop bringing up interfaces.
2290
Also remove all instances of "none" from the list */
2291
if(strcmp(interface, "none") == 0){
2292
argz_delete(&mc.interfaces, &mc.interfaces_size,
2295
while((interface = argz_next(mc.interfaces,
2296
mc.interfaces_size, interface))){
2297
if(strcmp(interface, "none") == 0){
2298
argz_delete(&mc.interfaces, &mc.interfaces_size,
2153
2305
bool interface_was_up = interface_is_up(interface);
2154
ret = bring_up_interface(interface, delay);
2306
errno = bring_up_interface(interface, delay);
2155
2307
if(not interface_was_up){
2158
2309
perror_plus("Failed to bring up interface");
2160
ret_errno = argz_add(&interfaces_to_take_down,
2161
&interfaces_to_take_down_size,
2311
errno = argz_add(&interfaces_to_take_down,
2312
&interfaces_to_take_down_size,
2315
perror_plus("argz_add");
2168
interfaces_size = 0;
2169
2320
if(debug and (interfaces_to_take_down == NULL)){
2170
2321
fprintf_plus(stderr, "No interfaces were brought up\n");
2325
/* If we only got one interface, explicitly use only that one */
2326
if(argz_count(mc.interfaces, mc.interfaces_size) == 1){
2328
fprintf_plus(stderr, "Using only interface \"%s\"\n",
2331
if_index = (AvahiIfIndex)if_nametoindex(mc.interfaces);
2178
ret = init_gnutls_global(pubkey, seckey);
2338
ret = init_gnutls_global(pubkey, seckey, &mc);
2180
2340
fprintf_plus(stderr, "init_gnutls_global failed\n");
2181
2341
exitcode = EX_UNAVAILABLE;
2381
/* Re-raise priviliges */
2552
/* Re-raise privileges */
2385
/* Run network hooks */
2386
run_network_hooks("stop", interfaces_hooks, delay);
2388
/* Take down the network interfaces which were brought up */
2390
char *interface = NULL;
2391
while((interface=argz_next(interfaces_to_take_down,
2392
interfaces_to_take_down_size,
2394
ret_errno = take_down_interface(interface);
2397
perror_plus("Failed to take down interface");
2400
if(debug and (interfaces_to_take_down == NULL)){
2401
fprintf_plus(stderr, "No interfaces needed to be taken"
2406
lower_privileges_permanently();
2554
ret_errno = raise_privileges();
2556
perror_plus("Failed to raise privileges");
2559
/* Run network hooks */
2560
run_network_hooks("stop", interfaces_hooks != NULL ?
2561
interfaces_hooks : "", delay);
2563
/* Take down the network interfaces which were brought up */
2565
char *interface = NULL;
2566
while((interface=argz_next(interfaces_to_take_down,
2567
interfaces_to_take_down_size,
2569
ret_errno = take_down_interface(interface);
2572
perror_plus("Failed to take down interface");
2575
if(debug and (interfaces_to_take_down == NULL)){
2576
fprintf_plus(stderr, "No interfaces needed to be taken"
2582
ret_errno = lower_privileges_permanently();
2584
perror_plus("Failed to lower privileges permanently");
2409
2588
free(interfaces_to_take_down);
2410
2589
free(interfaces_hooks);
2412
2591
/* Removes the GPGME temp directory and all files inside */
2413
if(tempdir_created){
2592
if(tempdir != NULL){
2414
2593
struct dirent **direntries = NULL;
2415
struct dirent *direntry = NULL;
2416
int numentries = scandir(tempdir, &direntries, notdotentries,
2418
if (numentries > 0){
2419
for(int i = 0; i < numentries; i++){
2420
direntry = direntries[i];
2421
char *fullname = NULL;
2422
ret = asprintf(&fullname, "%s/%s", tempdir,
2425
perror_plus("asprintf");
2428
ret = remove(fullname);
2430
fprintf_plus(stderr, "remove(\"%s\"): %s\n", fullname,
2594
int tempdir_fd = (int)TEMP_FAILURE_RETRY(open(tempdir, O_RDONLY |
2596
if(tempdir_fd == -1){
2597
perror_plus("open");
2600
#if __GLIBC_PREREQ(2, 15)
2601
int numentries = scandirat(tempdir_fd, ".", &direntries,
2602
notdotentries, alphasort);
2603
#else /* not __GLIBC_PREREQ(2, 15) */
2604
int numentries = scandir(tempdir, &direntries, notdotentries,
2606
#endif /* not __GLIBC_PREREQ(2, 15) */
2607
#else /* not __GLIBC__ */
2608
int numentries = scandir(tempdir, &direntries, notdotentries,
2610
#endif /* not __GLIBC__ */
2612
for(int i = 0; i < numentries; i++){
2613
ret = unlinkat(tempdir_fd, direntries[i]->d_name, 0);
2615
fprintf_plus(stderr, "unlinkat(open(\"%s\", O_RDONLY),"
2616
" \"%s\", 0): %s\n", tempdir,
2617
direntries[i]->d_name, strerror(errno));
2621
/* need to clean even if 0 because man page doesn't specify */
2623
if(numentries == -1){
2624
perror_plus("scandir");
2626
ret = rmdir(tempdir);
2627
if(ret == -1 and errno != ENOENT){
2628
perror_plus("rmdir");
2437
/* need to clean even if 0 because man page doesn't specify */
2439
if (numentries == -1){
2440
perror_plus("scandir");
2442
ret = rmdir(tempdir);
2443
if(ret == -1 and errno != ENOENT){
2444
perror_plus("rmdir");
2631
TEMP_FAILURE_RETRY(close(tempdir_fd));