20698ec252b52435826ea99fa38dd9208faa054b
3 * $Id: daemon.c,v 1.16 2003/11/29 23:39:16 mdw Exp $
5 * Running a `become' daemon
10 /*----- Licensing notice --------------------------------------------------*
12 * This file is part of `become'
14 * `Become' is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
19 * `Become' is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
24 * You should have received a copy of the GNU General Public License
25 * along with `become'; if not, write to the Free Software Foundation,
26 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
29 /*----- Revision history --------------------------------------------------*
32 * Revision 1.16 2003/11/29 23:39:16 mdw
35 * Revision 1.15 2003/10/26 11:57:46 mdw
36 * Fix key reloading core dumps. Change advice on keys.
38 * Revision 1.14 2003/10/17 16:30:22 mdw
39 * Reload keys and config files automatically.
41 * Revision 1.13 2003/10/12 10:00:06 mdw
42 * Fix for daemon mode. Oops.
44 * Revision 1.12 2003/10/12 00:14:55 mdw
45 * Major overhaul. Now uses DSA signatures rather than the bogus symmetric
46 * encrypt-and-hope thing. Integrated with mLib and Catacomb.
48 * Revision 1.11 1999/05/04 16:17:12 mdw
49 * Change to header file name for parser. See log for `parse.h' for
52 * Revision 1.10 1998/04/23 13:23:09 mdw
53 * Support new interface to configuration file parser.
55 * Revision 1.9 1998/01/12 16:45:59 mdw
58 * Revision 1.8 1997/09/26 09:14:58 mdw
59 * Merged blowfish branch into trunk.
61 * Revision 1.7.2.1 1997/09/26 09:08:05 mdw
62 * Use the Blowfish encryption algorithm instead of IDEA. This is partly
63 * because I prefer Blowfish (without any particularly strong evidence) but
64 * mainly because IDEA is patented and Blowfish isn't.
66 * Revision 1.7 1997/09/17 10:23:23 mdw
67 * Fix a typo. Port numbers are in network order now, so don't change them.
69 * Revision 1.6 1997/09/09 18:17:06 mdw
70 * Allow default port to be given as a service name or port number.
72 * Revision 1.5 1997/08/20 16:17:10 mdw
73 * More sensible restart routine: `_reinit' functions replaced by `_end' and
76 * Revision 1.4 1997/08/07 10:00:37 mdw
77 * (Log entry for previous version is bogus.) Read netgroups database.
78 * Give up privileges permanently on startup.
80 * Revision 1.2 1997/08/04 10:24:21 mdw
81 * Sources placed under CVS control.
83 * Revision 1.1 1997/07/21 13:47:50 mdw
88 /*----- Header files ------------------------------------------------------*/
90 /* --- ANSI headers --- */
98 /* --- Unix headers --- */
100 #include <sys/types.h>
101 #include <sys/time.h>
102 #include <sys/socket.h>
104 #include <netinet/in.h>
106 #include <arpa/inet.h>
112 /* --- mLib headers --- */
114 #include <mLib/fwatch.h>
115 #include <mLib/quis.h>
116 #include <mLib/report.h>
117 #include <mLib/sel.h>
118 #include <mLib/sig.h>
119 #include <mLib/sym.h>
120 #include <mLib/trace.h>
122 /* --- Catacomb headers --- */
124 #include <catacomb/buf.h>
125 #include <catacomb/dsa.h>
126 #include <catacomb/key.h>
127 #include <catacomb/mp.h>
128 #include <catacomb/noise.h>
129 #include <catacomb/paranoia.h>
130 #include <catacomb/rand.h>
131 #include <catacomb/sha.h>
133 /* --- Local headers --- */
145 /*----- Arbitrary constants -----------------------------------------------*/
147 #define daemon__awakeEvery (10) /* Awaken this often to rescan */
149 /*----- Static variables --------------------------------------------------*/
151 static int daemon__port
= -1; /* No particular port yet */
152 static fwatch daemon__cwatch
, daemon__kwatch
; /* Watching key/config files */
153 static sel_timer daemon__timer
; /* Timer for reading */
154 static sel_state daemon__sel
; /* Select context */
155 static sel_file daemon__listen
; /* Listening socket selector */
156 static const char *daemon__config
; /* Configuration file for daemon */
157 static const char *daemon__keyfile
; /* Keyring file for daemon */
158 static dsa_priv daemon__key
; /* The key data */
160 /*----- Main code ---------------------------------------------------------*/
162 /* --- @daemon_usePort@ --- *
164 * Arguments: @int port@ = port to use, please
168 * Use: Instructs the daemon to listen to the given port.
171 void daemon_usePort(int port
)
176 /* --- @daemon__moan@ --- *
178 * Arguments: @const char *f@ = offending file name
179 * @int line@ = offending line of the file
180 * @const char *msg@ = message
181 * @void *p@ = ignored
185 * Use: Reports an error message about a key file.
188 static void daemon__moan(const char *f
, int line
, const char *msg
, void *p
)
190 syslog(LOG_ERR
, "key file error: %s: %d: %s", f
, line
, msg
);
191 T( trace(TRACE_DAEMON
, "daemon: key file error: %s: %d: %s",
195 /* --- @daemon_readKey@ --- *
197 * Arguments: @const char *kf@ = pointer to key file name to use
201 * Use: Loads the private key from the key file.
204 void daemon_readKey(const char *kf
)
206 key_packstruct kps
[DSA_PRIVFETCHSZ
];
214 T( trace(TRACE_DAEMON
, "daemon: reading key from `%s'", kf
); )
215 if (key_open(&f
, kf
, KOPEN_READ
, daemon__moan
, 0))
217 kp
= key_fetchinit(dsa_privfetch
, kps
, &daemon__key
);
218 if ((k
= key_bytype(&f
, "become-dsa")) == 0)
221 err
= key_fetch(kp
, k
);
223 syslog(LOG_ERR
, "couldn't load key: %s", key_strerror(err
));
225 mp_copy(daemon__key
.dp
.p
);
226 mp_copy(daemon__key
.dp
.q
);
227 mp_copy(daemon__key
.dp
.g
);
228 mp_copy(daemon__key
.x
);
229 mp_copy(daemon__key
.y
);
230 daemon__keyfile
= kf
;
236 /* --- @daemon__readConfig@ --- *
238 * Arguments: @const char *cf@ = pointer to configuration file to use
240 * Returns: Zero if it worked, nonzero if it hurt...
242 * Use: Reads the configuration file, and other things.
245 static int daemon__readConfig(const char *cf
)
250 if ((fp
= fopen(cf
, "r")) == 0)
255 if (!daemon__keyfile
)
256 daemon_readKey(file_KEY
);
257 T( trace(TRACE_DAEMON
, "daemon: read config file"); )
261 /* --- @daemon__read@ --- *
263 * Arguments: @int fd@ = socket handle
264 * @unsigned mode@ = ignored
265 * @void *p@ = ignored
269 * Use: Examines a buffer, and returns a response.
272 void daemon__read(int fd
, unsigned mode
, void *p
)
274 unsigned char buff
[65536]; /* Buffer for incoming packets */
275 struct sockaddr_in sin
; /* Address of packet sender */
276 char sender
[64]; /* Sender's hostname (resolved) */
277 octet h
[SHA_HASHSZ
]; /* Hash of the transmission buffer */
278 sha_ctx hc
; /* Hashing context */
279 request rq
; /* Request buffer for verification */
280 ssize_t sz
; /* Length of incoming message */
281 socklen_t slen
; /* Length of incoming address */
282 uint32 u
; /* Scratch integer */
283 uint16 ul
; /* And another */
284 struct hostent
*he
; /* Resolve structure */
285 mp
*m
, *k
, *r
, *s
; /* Integers for signing */
286 int ans
; /* Answer from the check */
287 buf b
; /* Buffer for parsing request */
289 /* --- Kick some randomness in the pot --- */
291 noise_timer(RAND_GLOBAL
);
293 /* --- Read the message --- */
296 if ((sz
= recvfrom(fd
, (char *)buff
, sizeof(buff
), 0,
297 (struct sockaddr
*)&sin
, &slen
)) < 0) {
298 T( trace(TRACE_DAEMON
, "daemon: error reading packet: %s",
300 syslog(LOG_INFO
, "duff packet received: %e");
304 /* --- Resolve the host name --- */
306 he
= gethostbyaddr((char *)&sin
.sin_addr
, sizeof(sin
.sin_addr
), AF_INET
);
308 strncat(sender
, he ? he
->h_name
: inet_ntoa(sin
.sin_addr
),
310 syslog(LOG_DEBUG
, "packet received from %s", sender
);
311 T( trace(TRACE_DAEMON
, "daemon: received request from %s", sender
); )
313 /* --- Sanity check --- */
315 if (!daemon__keyfile
) {
316 syslog(LOG_NOTICE
, "no key file: ignoring request");
317 T( trace(TRACE_DAEMON
, "daemon: no key file: ignoring request"); )
321 /* --- Unpack the block --- */
323 rq
.host
= sin
.sin_addr
;
324 buf_init(&b
, buff
, sz
);
325 if (buf_ensure(&b
, SHA_HASHSZ
)) goto fail
; BSTEP(&b
, SHA_HASHSZ
);
326 if (buf_getu32(&b
, &u
)) goto fail
; rq
.from
= u
;
327 if (buf_getu32(&b
, &u
)) goto fail
; rq
.to
= u
;
328 if (buf_getu16(&b
, &ul
) || buf_ensure(&b
, ul
) || ul
>= sizeof(rq
.cmd
))
330 memcpy(rq
.cmd
, BCUR(&b
), ul
);
333 if (BLEFT(&b
)) goto fail
;
335 /* --- Hash the request block --- */
338 sha_hash(&hc
, buff
, sz
);
341 /* --- Build a reply block --- */
343 ans
= rule_check(&rq
);
344 syslog(LOG_INFO
, "request from %s for %i to become %i to run %s %s",
345 sender
, rq
.from
, rq
.to
, rq
.cmd
, ans ?
"granted" : "denied");
346 buf_init(&b
, buff
, sizeof(buff
));
347 if (buf_put(&b
, h
, sizeof(h
)) || buf_putbyte(&b
, ans
))
350 /* --- Sign the reply block --- */
353 sha_hash(&hc
, BBASE(&b
), BLEN(&b
));
355 m
= mp_loadb(MP_NEW
, h
, sizeof(h
));
356 rand_get(RAND_GLOBAL
, h
, sizeof(h
));
357 k
= mp_loadb(MP_NEWSEC
, h
, sizeof(h
));
359 dsa_mksig(&daemon__key
.dp
, daemon__key
.x
, m
, k
, &r
, &s
);
369 /* --- Send the reply off --- */
371 sendto(fd
, BBASE(&b
), BLEN(&b
), 0, (struct sockaddr
*)&sin
, sizeof(sin
));
372 T( trace(TRACE_DAEMON
, "daemon: reply sent"); )
376 syslog(LOG_ERR
, "couldn't respond to query");
377 T( trace(TRACE_DAEMON
, "daemon: failed to answer query"); )
380 /* --- @daemon__die@ --- *
382 * Arguments: @int n@ = signal number
383 * @void *p@ = ignored
387 * Use: Exits the daemon.
390 static void daemon__die(int n
, void *p
)
392 T( trace(TRACE_DAEMON
, "daemon: killed by signal %i", n
); )
393 syslog(LOG_NOTICE
, "killed by signal type %i", n
);
398 /* --- @daemon__setTimer@ --- *
404 * Use: Sets the interval timer up.
407 static void daemon__wakeUp(struct timeval
*tv
, void *p
);
409 static void daemon__setTimer(void)
413 gettimeofday(&tv
, 0);
414 tv
.tv_sec
+= daemon__awakeEvery
;
415 sel_addtimer(&daemon__sel
, &daemon__timer
, &tv
, daemon__wakeUp
, 0);
418 /* --- @daemon__rescan@ --- *
420 * Arguments: @int n@ = signal number
421 * @void *p@ = ignored
425 * Use: Forces a rescan of the daemon's configuration.
428 static void daemon__rescan(int n
, void *p
)
430 syslog(LOG_INFO
, "rescanning configuration file");
435 dsa_privfree(&daemon__key
);
442 if (daemon__readConfig(daemon__config
))
443 syslog(LOG_ERR
, "error reading configuration file");
444 sel_rmtimer(&daemon__timer
);
446 fwatch_update(&daemon__cwatch
, daemon__config
);
447 fwatch_update(&daemon__kwatch
, daemon__keyfile
);
450 /* --- @daemon__wakeUp@ --- *
452 * Arguments: @struct timeval *tv@ = ignored
453 * @void *p@ = ignored
457 * Use: Wakes up periodically to check the configuration file.
460 static void daemon__wakeUp(struct timeval
*tv
, void *p
)
462 T( trace(TRACE_DAEMON
, "daemon: interval timer"); )
463 rand_seed(RAND_GLOBAL
, 160);
465 if (fwatch_update(&daemon__cwatch
, daemon__config
))
466 daemon__rescan(0, 0);
467 else if (fwatch_update(&daemon__kwatch
, daemon__keyfile
)) {
468 const char *kf
= daemon__keyfile
;
474 /* --- @daemon_init@ --- *
476 * Arguments: @const char *cf@ = pointer to name of configuration file
477 * @int port@ = port to listen to, or %$-1$% for default
478 * @unsigned f@ = various flags
482 * Use: Starts `become' up in daemon mode.
485 void daemon_init(const char *cf
, int port
, unsigned f
)
490 static struct sigvec
{
492 void (*proc
)(int n
, void *p
);
495 { SIGHUP
, daemon__rescan
},
496 { SIGINT
, daemon__die
},
497 { SIGTERM
, daemon__die
},
498 { SIGQUIT
, daemon__die
},
502 /* --- Remove my root privileges --- *
504 * Just in case there's anything dodgy in my configuration file, or the
505 * user wants me to start on a funny port.
510 /* --- Initialize the random number generator --- */
512 rand_noisesrc(RAND_GLOBAL
, &noise_source
);
513 rand_seed(RAND_GLOBAL
, 160);
515 /* --- Initialise bits of the program --- */
519 sel_init(&daemon__sel
);
520 sig_init(&daemon__sel
);
527 openlog(quis(), 0, LOG_DAEMON
);
528 syslog(LOG_NOTICE
, "starting up");
530 if (daemon__readConfig(daemon__config
))
531 die(1, "couldn't read configuration file");
532 fwatch_init(&daemon__cwatch
, daemon__config
);
533 fwatch_init(&daemon__kwatch
, daemon__keyfile
);
535 /* --- Decide on a port to use --- *
537 * If I don't have a port yet (e.g., from the configuration file) then
538 * look it up in /etc/services under whatever name I was started as.
541 if (daemon__port
== 0) {
542 struct servent
*se
= getservbyname(quis(), "udp");
544 daemon__port
= se
->s_port
;
546 daemon__port
= htons(SERVER_PORT
);
549 /* --- Now set up a socket --- */
552 struct sockaddr_in sin
;
554 if ((s
= socket(PF_INET
, SOCK_DGRAM
, 0)) == -1)
555 die(1, "couldn't create socket: %s", strerror(errno
));
556 sin
.sin_family
= AF_INET
;
557 sin
.sin_port
= daemon__port
;
558 sin
.sin_addr
.s_addr
= htonl(INADDR_ANY
);
559 if (bind(s
, (struct sockaddr
*)&sin
, sizeof(sin
))) {
560 die(1, "couldn't bind socket to port %i: %s",
561 ntohs(daemon__port
), strerror(errno
));
565 /* --- Fork off into the sunset --- */
567 if (!(f
& df_nofork
)) {
571 /* --- Make a background process --- */
574 die(1, "couldn't fork daemon: %s", strerror(errno
));
578 /* --- Disconnect from the terminal --- */
582 /* --- Write my process id to a file --- */
584 if ((fp
= fopen(file_PID
, "w")) != 0) {
585 fprintf(fp
, "%lu\n", (unsigned long)getpid());
588 T( trace(TRACE_DAEMON
, "daemon: forked to pid %li", (long)getpid()); )
591 /* --- Set signal handlers --- */
593 for (i
= 0; sigs
[i
].proc
; i
++)
594 sig_add(&sigs
[i
].s
, sigs
[i
].sig
, sigs
[i
].proc
, 0);
596 /* --- Set the timer for rescanning the file --- */
600 /* --- Watch for input --- */
602 sel_initfile(&daemon__sel
, &daemon__listen
, s
, SEL_READ
,
604 sel_addfile(&daemon__listen
);
606 /* --- Now wait for something exciting to happen --- */
609 if (sel_select(&daemon__sel
)) {
610 if (errno
== EINTR
|| errno
== EAGAIN
)
612 syslog(LOG_ERR
, "error from select: %s", strerror(errno
));
618 /*----- That's all, folks -------------------------------------------------*/