9
9
* "browse_callback", and parts of "main".
11
11
* Everything else is
12
* Copyright © 2008-2018 Teddy Hogeborn
13
* Copyright © 2008-2018 Björn Påhlsson
15
* This file is part of Mandos.
17
* Mandos is free software: you can redistribute it and/or modify it
18
* under the terms of the GNU General Public License as published by
19
* the Free Software Foundation, either version 3 of the License, or
20
* (at your option) any later version.
22
* Mandos is distributed in the hope that it will be useful, but
12
* Copyright © 2008-2016 Teddy Hogeborn
13
* Copyright © 2008-2016 Björn Påhlsson
15
* This program is free software: you can redistribute it and/or
16
* modify it under the terms of the GNU General Public License as
17
* published by the Free Software Foundation, either version 3 of the
18
* License, or (at your option) any later version.
20
* This program is distributed in the hope that it will be useful, but
23
21
* WITHOUT ANY WARRANTY; without even the implied warranty of
24
22
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
25
23
* General Public License for more details.
27
25
* You should have received a copy of the GNU General Public License
28
* along with Mandos. If not, see <http://www.gnu.org/licenses/>.
26
* along with this program. If not, see
27
* <http://www.gnu.org/licenses/>.
30
29
* Contact the authors at <mandos@recompile.se>.
48
47
strtof(), abort() */
49
48
#include <stdbool.h> /* bool, false, true */
50
49
#include <string.h> /* strcmp(), strlen(), strerror(),
51
asprintf(), strncpy(), strsignal()
50
asprintf(), strncpy() */
53
51
#include <sys/ioctl.h> /* ioctl */
54
52
#include <sys/types.h> /* socket(), inet_pton(), sockaddr,
55
53
sockaddr_in6, PF_INET6,
356
354
/* Create new GPGME "context" */
357
355
rc = gpgme_new(&(mc->ctx));
358
356
if(rc != GPG_ERR_NO_ERROR){
359
fprintf_plus(stderr, "bad gpgme_new: %s: %s\n",
360
gpgme_strsource(rc), gpgme_strerror(rc));
357
fprintf_plus(stderr, "Mandos plugin mandos-client: "
358
"bad gpgme_new: %s: %s\n", gpgme_strsource(rc),
399
398
/* Create new empty GPGME data buffer for the plaintext */
400
399
rc = gpgme_data_new(&dh_plain);
401
400
if(rc != GPG_ERR_NO_ERROR){
402
fprintf_plus(stderr, "bad gpgme_data_new: %s: %s\n",
401
fprintf_plus(stderr, "Mandos plugin mandos-client: "
402
"bad gpgme_data_new: %s: %s\n",
403
403
gpgme_strsource(rc), gpgme_strerror(rc));
404
404
gpgme_data_release(dh_crypto);
418
418
if(result == NULL){
419
419
fprintf_plus(stderr, "gpgme_op_decrypt_result failed\n");
421
if(result->unsupported_algorithm != NULL) {
422
fprintf_plus(stderr, "Unsupported algorithm: %s\n",
423
result->unsupported_algorithm);
425
fprintf_plus(stderr, "Wrong key usage: %s\n",
426
result->wrong_key_usage ? "Yes" : "No");
421
fprintf_plus(stderr, "Unsupported algorithm: %s\n",
422
result->unsupported_algorithm);
423
fprintf_plus(stderr, "Wrong key usage: %u\n",
424
result->wrong_key_usage);
427
425
if(result->file_name != NULL){
428
426
fprintf_plus(stderr, "File name: %s\n", result->file_name);
825
818
/* Set effective uid to 0, return errno */
826
819
__attribute__((warn_unused_result))
827
int raise_privileges(void){
828
int old_errno = errno;
820
error_t raise_privileges(void){
821
error_t old_errno = errno;
822
error_t ret_errno = 0;
830
823
if(seteuid(0) == -1){
833
826
errno = old_errno;
837
830
/* Set effective and real user ID to 0. Return errno. */
838
831
__attribute__((warn_unused_result))
839
int raise_privileges_permanently(void){
840
int old_errno = errno;
841
int ret = raise_privileges();
832
error_t raise_privileges_permanently(void){
833
error_t old_errno = errno;
834
error_t ret_errno = raise_privileges();
843
836
errno = old_errno;
846
839
if(setuid(0) == -1){
849
842
errno = old_errno;
853
846
/* Set effective user ID to unprivileged saved user ID */
854
847
__attribute__((warn_unused_result))
855
int lower_privileges(void){
856
int old_errno = errno;
848
error_t lower_privileges(void){
849
error_t old_errno = errno;
850
error_t ret_errno = 0;
858
851
if(seteuid(uid) == -1){
861
854
errno = old_errno;
865
858
/* Lower privileges permanently */
866
859
__attribute__((warn_unused_result))
867
int lower_privileges_permanently(void){
868
int old_errno = errno;
860
error_t lower_privileges_permanently(void){
861
error_t old_errno = errno;
862
error_t ret_errno = 0;
870
863
if(setuid(uid) == -1){
873
866
errno = old_errno;
877
870
/* Helper function to add_local_route() and delete_local_route() */
1084
1077
bool match = false;
1086
1079
char *interface = NULL;
1087
while((interface = argz_next(mc->interfaces,
1088
mc->interfaces_size,
1080
while((interface=argz_next(mc->interfaces, mc->interfaces_size,
1090
1082
if(if_nametoindex(interface) == (unsigned int)if_index){
1245
1237
with an explicit route added with the server's address.
1247
1239
Avahi bug reference:
1248
https://lists.freedesktop.org/archives/avahi/2010-February/001833.html
1240
http://lists.freedesktop.org/archives/avahi/2010-February/001833.html
1249
1241
https://bugs.debian.org/587961
1641
1623
__attribute__((nonnull, warn_unused_result))
1642
1624
bool get_flags(const char *ifname, struct ifreq *ifr){
1646
1628
int s = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
1649
1631
perror_plus("socket");
1653
1635
strncpy(ifr->ifr_name, ifname, IF_NAMESIZE);
1655
1637
ret = ioctl(s, SIOCGIFFLAGS, ifr);
1659
1641
perror_plus("ioctl SIOCGIFFLAGS");
1662
if((close(s) == -1) and debug){
1664
perror_plus("close");
1669
if((close(s) == -1) and debug){
1671
perror_plus("close");
1940
int devnull = (int)TEMP_FAILURE_RETRY(open("/dev/null", O_RDONLY));
1942
perror_plus("open(\"/dev/null\", O_RDONLY)");
1945
1912
int numhooks = scandirat(hookdir_fd, ".", &direntries,
1946
1913
runnable_hook, alphasort);
1947
1914
if(numhooks == -1){
1948
1915
perror_plus("scandir");
1952
1918
struct dirent *direntry;
1920
int devnull = (int)TEMP_FAILURE_RETRY(open("/dev/null", O_RDONLY));
1922
perror_plus("open(\"/dev/null\", O_RDONLY)");
1954
1925
for(int i = 0; i < numhooks; i++){
1955
1926
direntry = direntries[i];
2102
2073
__attribute__((nonnull, warn_unused_result))
2103
int bring_up_interface(const char *const interface,
2105
int old_errno = errno;
2074
error_t bring_up_interface(const char *const interface,
2076
error_t old_errno = errno;
2107
2078
struct ifreq network;
2108
2079
unsigned int if_index = if_nametoindex(interface);
2120
2091
if(not interface_is_up(interface)){
2122
int ioctl_errno = 0;
2092
error_t ret_errno = 0, ioctl_errno = 0;
2123
2093
if(not get_flags(interface, &network)){
2124
2094
ret_errno = errno;
2125
2095
fprintf_plus(stderr, "Failed to get flags for interface "
2213
2183
/* Sleep checking until interface is running.
2214
2184
Check every 0.25s, up to total time of delay */
2215
for(int i = 0; i < delay * 4; i++){
2185
for(int i=0; i < delay * 4; i++){
2216
2186
if(interface_is_running(interface)){
2230
2200
__attribute__((nonnull, warn_unused_result))
2231
int take_down_interface(const char *const interface){
2232
int old_errno = errno;
2201
error_t take_down_interface(const char *const interface){
2202
error_t old_errno = errno;
2233
2203
struct ifreq network;
2234
2204
unsigned int if_index = if_nametoindex(interface);
2235
2205
if(if_index == 0){
2240
2210
if(interface_is_up(interface)){
2242
int ioctl_errno = 0;
2211
error_t ret_errno = 0, ioctl_errno = 0;
2243
2212
if(not get_flags(interface, &network) and debug){
2244
2213
ret_errno = errno;
2245
2214
fprintf_plus(stderr, "Failed to get flags for interface "
2495
2464
.args_doc = "",
2496
2465
.doc = "Mandos client -- Get and decrypt"
2497
2466
" passwords from a Mandos server" };
2498
ret_errno = argp_parse(&argp, argc, argv,
2499
ARGP_IN_ORDER | ARGP_NO_HELP, 0, NULL);
2467
ret = argp_parse(&argp, argc, argv,
2468
ARGP_IN_ORDER | ARGP_NO_HELP, 0, NULL);
2506
2475
perror_plus("argp_parse");
2507
2476
exitcode = EX_OSERR;
2516
2485
/* Work around Debian bug #633582:
2517
<https://bugs.debian.org/633582> */
2486
<http://bugs.debian.org/633582> */
2519
2488
/* Re-raise privileges */
2520
ret = raise_privileges();
2489
ret_errno = raise_privileges();
2523
2492
perror_plus("Failed to raise privileges");
2525
2494
struct stat st;
2926
2895
/* Allocate a new server */
2927
2896
mc.server = avahi_server_new(avahi_simple_poll_get(simple_poll),
2928
&config, NULL, NULL, &ret);
2897
&config, NULL, NULL, &ret_errno);
2930
2899
/* Free the Avahi configuration data */
2931
2900
avahi_server_config_free(&config);
2934
2903
/* Check if creating the Avahi server object succeeded */
2935
2904
if(mc.server == NULL){
2936
2905
fprintf_plus(stderr, "Failed to create Avahi server: %s\n",
2937
avahi_strerror(ret));
2906
avahi_strerror(ret_errno));
2938
2907
exitcode = EX_UNAVAILABLE;
2978
if(signal_received){
2979
fprintf_plus(stderr, "%s exiting due to signal %d: %s\n",
2980
argv[0], signal_received,
2981
strsignal(signal_received));
2983
fprintf_plus(stderr, "%s exiting\n", argv[0]);
2947
fprintf_plus(stderr, "%s exiting\n", argv[0]);
2987
2950
/* Cleanup things */
3039
3002
/* Take down the network interfaces which were brought up */
3041
3004
char *interface = NULL;
3042
while((interface = argz_next(interfaces_to_take_down,
3043
interfaces_to_take_down_size,
3045
ret = take_down_interface(interface);
3005
while((interface=argz_next(interfaces_to_take_down,
3006
interfaces_to_take_down_size,
3008
ret_errno = take_down_interface(interface);
3048
3011
perror_plus("Failed to take down interface");
3099
3061
clean_dir_at(dir_fd, direntries[i]->d_name, level+1);
3102
if((dret == -1) and (errno != ENOENT)){
3103
3065
fprintf_plus(stderr, "unlink(\"%s/%s\"): %s\n", dirname,
3104
3066
direntries[i]->d_name, strerror(errno));
3110
3072
/* need to clean even if 0 because man page doesn't specify */
3111
3073
free(direntries);
3074
if(numentries == -1){
3075
perror_plus("scandirat");
3112
3077
dret = unlinkat(base, dirname, AT_REMOVEDIR);
3113
3078
if(dret == -1 and errno != ENOENT){
3114
3079
perror_plus("rmdir");