9
9
* "browse_callback", and parts of "main".
11
11
* Everything else is
12
* Copyright © 2008-2016 Teddy Hogeborn
13
* Copyright © 2008-2016 Björn Påhlsson
15
* This program is free software: you can redistribute it and/or
16
* modify it under the terms of the GNU General Public License as
17
* published by the Free Software Foundation, either version 3 of the
18
* License, or (at your option) any later version.
20
* This program is distributed in the hope that it will be useful, but
12
* Copyright © 2008-2018 Teddy Hogeborn
13
* Copyright © 2008-2018 Björn Påhlsson
15
* This file is part of Mandos.
17
* Mandos is free software: you can redistribute it and/or modify it
18
* under the terms of the GNU General Public License as published by
19
* the Free Software Foundation, either version 3 of the License, or
20
* (at your option) any later version.
22
* Mandos is distributed in the hope that it will be useful, but
21
23
* WITHOUT ANY WARRANTY; without even the implied warranty of
22
24
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
23
25
* General Public License for more details.
25
27
* You should have received a copy of the GNU General Public License
26
* along with this program. If not, see
27
* <http://www.gnu.org/licenses/>.
28
* along with Mandos. If not, see <http://www.gnu.org/licenses/>.
29
30
* Contact the authors at <mandos@recompile.se>.
47
48
strtof(), abort() */
48
49
#include <stdbool.h> /* bool, false, true */
49
50
#include <string.h> /* strcmp(), strlen(), strerror(),
50
asprintf(), strncpy() */
51
asprintf(), strncpy(), strsignal()
51
53
#include <sys/ioctl.h> /* ioctl */
52
54
#include <sys/types.h> /* socket(), inet_pton(), sockaddr,
53
55
sockaddr_in6, PF_INET6,
818
821
/* Set effective uid to 0, return errno */
819
822
__attribute__((warn_unused_result))
820
error_t raise_privileges(void){
821
error_t old_errno = errno;
822
error_t ret_errno = 0;
823
int raise_privileges(void){
824
int old_errno = errno;
823
826
if(seteuid(0) == -1){
826
829
errno = old_errno;
830
833
/* Set effective and real user ID to 0. Return errno. */
831
834
__attribute__((warn_unused_result))
832
error_t raise_privileges_permanently(void){
833
error_t old_errno = errno;
834
error_t ret_errno = raise_privileges();
835
int raise_privileges_permanently(void){
836
int old_errno = errno;
837
int ret = raise_privileges();
836
839
errno = old_errno;
839
842
if(setuid(0) == -1){
842
845
errno = old_errno;
846
849
/* Set effective user ID to unprivileged saved user ID */
847
850
__attribute__((warn_unused_result))
848
error_t lower_privileges(void){
849
error_t old_errno = errno;
850
error_t ret_errno = 0;
851
int lower_privileges(void){
852
int old_errno = errno;
851
854
if(seteuid(uid) == -1){
854
857
errno = old_errno;
858
861
/* Lower privileges permanently */
859
862
__attribute__((warn_unused_result))
860
error_t lower_privileges_permanently(void){
861
error_t old_errno = errno;
862
error_t ret_errno = 0;
863
int lower_privileges_permanently(void){
864
int old_errno = errno;
863
866
if(setuid(uid) == -1){
866
869
errno = old_errno;
870
873
/* Helper function to add_local_route() and delete_local_route() */
1077
1080
bool match = false;
1079
1082
char *interface = NULL;
1080
while((interface=argz_next(mc->interfaces, mc->interfaces_size,
1083
while((interface = argz_next(mc->interfaces,
1084
mc->interfaces_size,
1082
1086
if(if_nametoindex(interface) == (unsigned int)if_index){
1237
1241
with an explicit route added with the server's address.
1239
1243
Avahi bug reference:
1240
http://lists.freedesktop.org/archives/avahi/2010-February/001833.html
1244
https://lists.freedesktop.org/archives/avahi/2010-February/001833.html
1241
1245
https://bugs.debian.org/587961
1623
1637
__attribute__((nonnull, warn_unused_result))
1624
1638
bool get_flags(const char *ifname, struct ifreq *ifr){
1628
1642
int s = socket(PF_INET6, SOCK_DGRAM, IPPROTO_IP);
1631
1645
perror_plus("socket");
1635
1649
strncpy(ifr->ifr_name, ifname, IF_NAMESIZE);
1926
int devnull = (int)TEMP_FAILURE_RETRY(open("/dev/null", O_RDONLY));
1928
perror_plus("open(\"/dev/null\", O_RDONLY)");
1912
1931
int numhooks = scandirat(hookdir_fd, ".", &direntries,
1913
1932
runnable_hook, alphasort);
1914
1933
if(numhooks == -1){
1915
1934
perror_plus("scandir");
1918
1938
struct dirent *direntry;
1920
int devnull = (int)TEMP_FAILURE_RETRY(open("/dev/null", O_RDONLY));
1922
perror_plus("open(\"/dev/null\", O_RDONLY)");
1925
1940
for(int i = 0; i < numhooks; i++){
1926
1941
direntry = direntries[i];
2073
2088
__attribute__((nonnull, warn_unused_result))
2074
error_t bring_up_interface(const char *const interface,
2076
error_t old_errno = errno;
2089
int bring_up_interface(const char *const interface,
2091
int old_errno = errno;
2078
2093
struct ifreq network;
2079
2094
unsigned int if_index = if_nametoindex(interface);
2091
2106
if(not interface_is_up(interface)){
2092
error_t ret_errno = 0, ioctl_errno = 0;
2108
int ioctl_errno = 0;
2093
2109
if(not get_flags(interface, &network)){
2094
2110
ret_errno = errno;
2095
2111
fprintf_plus(stderr, "Failed to get flags for interface "
2183
2199
/* Sleep checking until interface is running.
2184
2200
Check every 0.25s, up to total time of delay */
2185
for(int i=0; i < delay * 4; i++){
2201
for(int i = 0; i < delay * 4; i++){
2186
2202
if(interface_is_running(interface)){
2200
2216
__attribute__((nonnull, warn_unused_result))
2201
error_t take_down_interface(const char *const interface){
2202
error_t old_errno = errno;
2217
int take_down_interface(const char *const interface){
2218
int old_errno = errno;
2203
2219
struct ifreq network;
2204
2220
unsigned int if_index = if_nametoindex(interface);
2205
2221
if(if_index == 0){
2210
2226
if(interface_is_up(interface)){
2211
error_t ret_errno = 0, ioctl_errno = 0;
2228
int ioctl_errno = 0;
2212
2229
if(not get_flags(interface, &network) and debug){
2213
2230
ret_errno = errno;
2214
2231
fprintf_plus(stderr, "Failed to get flags for interface "
2464
2481
.args_doc = "",
2465
2482
.doc = "Mandos client -- Get and decrypt"
2466
2483
" passwords from a Mandos server" };
2467
ret = argp_parse(&argp, argc, argv,
2468
ARGP_IN_ORDER | ARGP_NO_HELP, 0, NULL);
2484
ret_errno = argp_parse(&argp, argc, argv,
2485
ARGP_IN_ORDER | ARGP_NO_HELP, 0, NULL);
2475
2492
perror_plus("argp_parse");
2476
2493
exitcode = EX_OSERR;
2485
2502
/* Work around Debian bug #633582:
2486
<http://bugs.debian.org/633582> */
2503
<https://bugs.debian.org/633582> */
2488
2505
/* Re-raise privileges */
2489
ret_errno = raise_privileges();
2506
ret = raise_privileges();
2492
2509
perror_plus("Failed to raise privileges");
2494
2511
struct stat st;
2895
2912
/* Allocate a new server */
2896
2913
mc.server = avahi_server_new(avahi_simple_poll_get(simple_poll),
2897
&config, NULL, NULL, &ret_errno);
2914
&config, NULL, NULL, &ret);
2899
2916
/* Free the Avahi configuration data */
2900
2917
avahi_server_config_free(&config);
2903
2920
/* Check if creating the Avahi server object succeeded */
2904
2921
if(mc.server == NULL){
2905
2922
fprintf_plus(stderr, "Failed to create Avahi server: %s\n",
2906
avahi_strerror(ret_errno));
2923
avahi_strerror(ret));
2907
2924
exitcode = EX_UNAVAILABLE;
2947
fprintf_plus(stderr, "%s exiting\n", argv[0]);
2964
if(signal_received){
2965
fprintf_plus(stderr, "%s exiting due to signal %d: %s\n",
2966
argv[0], signal_received,
2967
strsignal(signal_received));
2969
fprintf_plus(stderr, "%s exiting\n", argv[0]);
2950
2973
/* Cleanup things */
3002
3025
/* Take down the network interfaces which were brought up */
3004
3027
char *interface = NULL;
3005
while((interface=argz_next(interfaces_to_take_down,
3006
interfaces_to_take_down_size,
3008
ret_errno = take_down_interface(interface);
3028
while((interface = argz_next(interfaces_to_take_down,
3029
interfaces_to_take_down_size,
3031
ret = take_down_interface(interface);
3011
3034
perror_plus("Failed to take down interface");
3061
3085
clean_dir_at(dir_fd, direntries[i]->d_name, level+1);
3088
if((dret == -1) and (errno != ENOENT)){
3065
3089
fprintf_plus(stderr, "unlink(\"%s/%s\"): %s\n", dirname,
3066
3090
direntries[i]->d_name, strerror(errno));
3072
3096
/* need to clean even if 0 because man page doesn't specify */
3073
3097
free(direntries);
3074
if(numentries == -1){
3075
perror_plus("scandirat");
3077
3098
dret = unlinkat(base, dirname, AT_REMOVEDIR);
3078
3099
if(dret == -1 and errno != ENOENT){
3079
3100
perror_plus("rmdir");