1459
1485
if(setuid(0) == -1){
1460
1486
ret_errno = errno;
1461
perror_plus("seteuid");
1463
1488
errno = old_errno;
1464
1489
return ret_errno;
1467
1492
/* Set effective user ID to unprivileged saved user ID */
1493
__attribute__((warn_unused_result))
1468
1494
error_t lower_privileges(void){
1469
1495
error_t old_errno = errno;
1470
1496
error_t ret_errno = 0;
1471
1497
if(seteuid(uid) == -1){
1472
1498
ret_errno = errno;
1473
perror_plus("seteuid");
1475
1500
errno = old_errno;
1476
1501
return ret_errno;
1479
1504
/* Lower privileges permanently */
1505
__attribute__((warn_unused_result))
1480
1506
error_t lower_privileges_permanently(void){
1481
1507
error_t old_errno = errno;
1482
1508
error_t ret_errno = 0;
1483
1509
if(setuid(uid) == -1){
1484
1510
ret_errno = errno;
1485
perror_plus("setuid");
1487
1512
errno = old_errno;
1488
1513
return ret_errno;
1491
bool run_network_hooks(const char *mode, const char *interface,
1516
__attribute__((nonnull))
1517
void run_network_hooks(const char *mode, const char *interface,
1492
1518
const float delay){
1493
struct dirent **direntries;
1494
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1519
struct dirent **direntries = NULL;
1520
if(hookdir_fd == -1){
1521
hookdir_fd = open(hookdir, O_RDONLY);
1522
if(hookdir_fd == -1){
1523
if(errno == ENOENT){
1525
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1526
" found\n", hookdir);
1529
perror_plus("open");
1535
#if __GLIBC_PREREQ(2, 15)
1536
int numhooks = scandirat(hookdir_fd, ".", &direntries,
1537
runnable_hook, alphasort);
1538
#else /* not __GLIBC_PREREQ(2, 15) */
1539
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1541
#endif /* not __GLIBC_PREREQ(2, 15) */
1542
#else /* not __GLIBC__ */
1543
int numhooks = scandir(hookdir, &direntries, runnable_hook,
1545
#endif /* not __GLIBC__ */
1496
1546
if(numhooks == -1){
1497
if(errno == ENOENT){
1499
fprintf_plus(stderr, "Network hook directory \"%s\" not"
1500
" found\n", hookdir);
1503
perror_plus("scandir");
1547
perror_plus("scandir");
1550
struct dirent *direntry;
1552
int devnull = open("/dev/null", O_RDONLY);
1553
for(int i = 0; i < numhooks; i++){
1554
direntry = direntries[i];
1556
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1506
struct dirent *direntry;
1508
int devnull = open("/dev/null", O_RDONLY);
1509
for(int i = 0; i < numhooks; i++){
1510
direntry = direntries[i];
1511
char *fullname = NULL;
1512
ret = asprintf(&fullname, "%s/%s", hookdir, direntry->d_name);
1559
pid_t hook_pid = fork();
1562
/* Raise privileges */
1563
errno = raise_privileges_permanently();
1565
perror_plus("Failed to raise privileges");
1572
perror_plus("setgid");
1575
/* Reset supplementary groups */
1577
ret = setgroups(0, NULL);
1579
perror_plus("setgroups");
1582
ret = dup2(devnull, STDIN_FILENO);
1584
perror_plus("dup2(devnull, STDIN_FILENO)");
1587
ret = close(devnull);
1589
perror_plus("close");
1592
ret = dup2(STDERR_FILENO, STDOUT_FILENO);
1594
perror_plus("dup2(STDERR_FILENO, STDOUT_FILENO)");
1597
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1599
perror_plus("setenv");
1602
ret = setenv("DEVICE", interface, 1);
1604
perror_plus("setenv");
1607
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1609
perror_plus("setenv");
1612
ret = setenv("MODE", mode, 1);
1614
perror_plus("setenv");
1618
ret = asprintf(&delaystring, "%f", (double)delay);
1514
1620
perror_plus("asprintf");
1518
fprintf_plus(stderr, "Running network hook \"%s\"\n",
1521
pid_t hook_pid = fork();
1524
/* Raise privileges */
1525
raise_privileges_permanently();
1530
perror_plus("setgid");
1532
/* Reset supplementary groups */
1534
ret = setgroups(0, NULL);
1536
perror_plus("setgroups");
1538
dup2(devnull, STDIN_FILENO);
1540
dup2(STDERR_FILENO, STDOUT_FILENO);
1541
ret = setenv("MANDOSNETHOOKDIR", hookdir, 1);
1543
perror_plus("setenv");
1546
ret = setenv("DEVICE", interface, 1);
1548
perror_plus("setenv");
1551
ret = setenv("VERBOSITY", debug ? "1" : "0", 1);
1553
perror_plus("setenv");
1556
ret = setenv("MODE", mode, 1);
1558
perror_plus("setenv");
1562
ret = asprintf(&delaystring, "%f", delay);
1564
perror_plus("asprintf");
1567
ret = setenv("DELAY", delaystring, 1);
1570
perror_plus("setenv");
1623
ret = setenv("DELAY", delaystring, 1);
1573
1625
free(delaystring);
1574
if(connect_to != NULL){
1575
ret = setenv("CONNECT", connect_to, 1);
1577
perror_plus("setenv");
1581
if(execl(fullname, direntry->d_name, mode, NULL) == -1){
1582
perror_plus("execl");
1583
_exit(EXIT_FAILURE);
1626
perror_plus("setenv");
1630
if(connect_to != NULL){
1631
ret = setenv("CONNECT", connect_to, 1);
1633
perror_plus("setenv");
1637
int hook_fd = openat(hookdir_fd, direntry->d_name, O_RDONLY);
1639
perror_plus("openat");
1640
_exit(EXIT_FAILURE);
1642
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1643
perror_plus("close");
1644
_exit(EXIT_FAILURE);
1646
if(fexecve(hook_fd, (char *const []){ direntry->d_name, NULL },
1648
perror_plus("fexecve");
1649
_exit(EXIT_FAILURE);
1653
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1654
perror_plus("waitpid");
1657
if(WIFEXITED(status)){
1658
if(WEXITSTATUS(status) != 0){
1659
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1660
" with status %d\n", direntry->d_name,
1661
WEXITSTATUS(status));
1664
} else if(WIFSIGNALED(status)){
1665
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1666
" signal %d\n", direntry->d_name,
1587
if(TEMP_FAILURE_RETRY(waitpid(hook_pid, &status, 0)) == -1){
1588
perror_plus("waitpid");
1592
if(WIFEXITED(status)){
1593
if(WEXITSTATUS(status) != 0){
1594
fprintf_plus(stderr, "Warning: network hook \"%s\" exited"
1595
" with status %d\n", direntry->d_name,
1596
WEXITSTATUS(status));
1600
} else if(WIFSIGNALED(status)){
1601
fprintf_plus(stderr, "Warning: network hook \"%s\" died by"
1602
" signal %d\n", direntry->d_name,
1607
fprintf_plus(stderr, "Warning: network hook \"%s\""
1608
" crashed\n", direntry->d_name);
1615
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1670
fprintf_plus(stderr, "Warning: network hook \"%s\""
1671
" crashed\n", direntry->d_name);
1676
fprintf_plus(stderr, "Network hook \"%s\" ran successfully\n",
1681
if((int)TEMP_FAILURE_RETRY(close(hookdir_fd)) == -1){
1682
perror_plus("close");
1689
__attribute__((nonnull, warn_unused_result))
1624
1690
error_t bring_up_interface(const char *const interface,
1625
1691
const float delay){
1627
1692
error_t old_errno = errno;
1628
error_t ret_errno = 0;
1629
int ret, ret_setflags;
1630
1694
struct ifreq network;
1631
1695
unsigned int if_index = if_nametoindex(interface);
1632
1696
if(if_index == 0){
2444
2556
mc.current_server->prev->next = NULL;
2445
2557
while(mc.current_server != NULL){
2446
2558
server *next = mc.current_server->next;
2560
#pragma GCC diagnostic push
2561
#pragma GCC diagnostic ignored "-Wcast-qual"
2563
free((char *)(mc.current_server->ip));
2565
#pragma GCC diagnostic pop
2447
2567
free(mc.current_server);
2448
2568
mc.current_server = next;
2452
/* Re-raise priviliges */
2572
/* Re-raise privileges */
2456
/* Run network hooks */
2457
run_network_hooks("stop", interfaces_hooks != NULL ?
2458
interfaces_hooks : "", delay);
2460
/* Take down the network interfaces which were brought up */
2462
char *interface = NULL;
2463
while((interface=argz_next(interfaces_to_take_down,
2464
interfaces_to_take_down_size,
2466
ret_errno = take_down_interface(interface);
2469
perror_plus("Failed to take down interface");
2472
if(debug and (interfaces_to_take_down == NULL)){
2473
fprintf_plus(stderr, "No interfaces needed to be taken"
2478
lower_privileges_permanently();
2574
ret_errno = raise_privileges();
2577
perror_plus("Failed to raise privileges");
2580
/* Run network hooks */
2581
run_network_hooks("stop", interfaces_hooks != NULL ?
2582
interfaces_hooks : "", delay);
2584
/* Take down the network interfaces which were brought up */
2586
char *interface = NULL;
2587
while((interface=argz_next(interfaces_to_take_down,
2588
interfaces_to_take_down_size,
2590
ret_errno = take_down_interface(interface);
2593
perror_plus("Failed to take down interface");
2596
if(debug and (interfaces_to_take_down == NULL)){
2597
fprintf_plus(stderr, "No interfaces needed to be taken"
2603
ret_errno = lower_privileges_permanently();
2606
perror_plus("Failed to lower privileges permanently");
2481
2610
free(interfaces_to_take_down);
2482
2611
free(interfaces_hooks);
2484
2613
/* Removes the GPGME temp directory and all files inside */
2485
if(tempdir_created){
2614
if(tempdir != NULL){
2486
2615
struct dirent **direntries = NULL;
2487
struct dirent *direntry = NULL;
2488
int numentries = scandir(tempdir, &direntries, notdotentries,
2491
for(int i = 0; i < numentries; i++){
2492
direntry = direntries[i];
2493
char *fullname = NULL;
2494
ret = asprintf(&fullname, "%s/%s", tempdir,
2497
perror_plus("asprintf");
2500
ret = remove(fullname);
2502
fprintf_plus(stderr, "remove(\"%s\"): %s\n", fullname,
2616
int tempdir_fd = (int)TEMP_FAILURE_RETRY(open(tempdir, O_RDONLY |
2618
if(tempdir_fd == -1){
2619
perror_plus("open");
2622
#if __GLIBC_PREREQ(2, 15)
2623
int numentries = scandirat(tempdir_fd, ".", &direntries,
2624
notdotentries, alphasort);
2625
#else /* not __GLIBC_PREREQ(2, 15) */
2626
int numentries = scandir(tempdir, &direntries, notdotentries,
2628
#endif /* not __GLIBC_PREREQ(2, 15) */
2629
#else /* not __GLIBC__ */
2630
int numentries = scandir(tempdir, &direntries, notdotentries,
2632
#endif /* not __GLIBC__ */
2633
if(numentries >= 0){
2634
for(int i = 0; i < numentries; i++){
2635
ret = unlinkat(tempdir_fd, direntries[i]->d_name, 0);
2637
fprintf_plus(stderr, "unlinkat(open(\"%s\", O_RDONLY),"
2638
" \"%s\", 0): %s\n", tempdir,
2639
direntries[i]->d_name, strerror(errno));
2643
/* need to clean even if 0 because man page doesn't specify */
2645
if(numentries == -1){
2646
perror_plus("scandir");
2648
ret = rmdir(tempdir);
2649
if(ret == -1 and errno != ENOENT){
2650
perror_plus("rmdir");
2509
/* need to clean even if 0 because man page doesn't specify */
2511
if(numentries == -1){
2512
perror_plus("scandir");
2514
ret = rmdir(tempdir);
2515
if(ret == -1 and errno != ENOENT){
2516
perror_plus("rmdir");
2653
TEMP_FAILURE_RETRY(close(tempdir_fd));