blob: 9e60b89a858fc51b64e9ed85ef1d6f1733b125e0 [file] [log] [blame]
/* $NetBSD: privsep.c,v 1.6 2006/09/09 16:22:10 manu Exp $ */
/* Id: privsep.c,v 1.15 2005/08/08 11:23:44 vanhu Exp */
/*
* Copyright (C) 2004 Emmanuel Dreyfus
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the project nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include "config.h"
#include <unistd.h>
#include <string.h>
#ifdef __NetBSD__
#include <stdlib.h> /* for setproctitle */
#endif
#include <errno.h>
#include <signal.h>
#include <pwd.h>
#include <sys/socket.h>
#include <sys/param.h>
#include "gcmalloc.h"
#include "vmbuf.h"
#include "misc.h"
#include "plog.h"
#include "var.h"
#include "libpfkey.h"
#include "crypto_openssl.h"
#include "isakmp_var.h"
#include "isakmp.h"
#ifdef ENABLE_HYBRID
#include "resolv.h"
#include "isakmp_xauth.h"
#include "isakmp_cfg.h"
#endif
#include "localconf.h"
#include "remoteconf.h"
#include "admin.h"
#include "sockmisc.h"
#include "privsep.h"
static int privsep_sock[2] = { -1, -1 };
static int privsep_recv(int, struct privsep_com_msg **, size_t *);
static int privsep_send(int, struct privsep_com_msg *, size_t);
static int safety_check(struct privsep_com_msg *, int i);
static int port_check(int);
static int unsafe_env(char *const *);
static int unknown_name(int);
static int unsafe_path(char *, int);
static int
privsep_send(sock, buf, len)
int sock;
struct privsep_com_msg *buf;
size_t len;
{
if (buf == NULL)
return 0;
if (sendto(sock, (char *)buf, len, 0, NULL, 0) == -1) {
plog(LLV_ERROR, LOCATION, NULL,
"privsep_send failed: %s\n",
strerror(errno));
return -1;
}
racoon_free((char *)buf);
return 0;
}
static int
privsep_recv(sock, bufp, lenp)
int sock;
struct privsep_com_msg **bufp;
size_t *lenp;
{
struct admin_com com;
struct admin_com *combuf;
size_t len;
*bufp = NULL;
*lenp = 0;
/* Get the header */
while ((len = recvfrom(sock, (char *)&com,
sizeof(com), MSG_PEEK, NULL, NULL)) == -1) {
if (errno == EINTR)
continue;
plog(LLV_ERROR, LOCATION, NULL,
"privsep_recv failed: %s\n",
strerror(errno));
return -1;
}
/* Check for short packets */
if (len < sizeof(com)) {
plog(LLV_ERROR, LOCATION, NULL,
"corrupted privsep message (short header)\n");
return -1;
}
/* Allocate buffer for the whole message */
if ((combuf = (struct admin_com *)racoon_malloc(com.ac_len)) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"failed to allocate memory: %s\n", strerror(errno));
return -1;
}
/* Get the whole buffer */
while ((len = recvfrom(sock, (char *)combuf,
com.ac_len, 0, NULL, NULL)) == -1) {
if (errno == EINTR)
continue;
plog(LLV_ERROR, LOCATION, NULL,
"failed to recv privsep command: %s\n",
strerror(errno));
return -1;
}
/* We expect len to match */
if (len != com.ac_len) {
plog(LLV_ERROR, LOCATION, NULL,
"corrupted privsep message (short packet)\n");
return -1;
}
*bufp = (struct privsep_com_msg *)combuf;
*lenp = len;
return 0;
}
int
privsep_init(void)
{
int i;
pid_t child_pid;
/* If running as root, we don't use the privsep code path */
if (lcconf->uid == 0)
return 0;
/*
* When running privsep, certificate and script paths
* are mandatory, as they enable us to check path safety
* in the privilegied instance
*/
if ((lcconf->pathinfo[LC_PATHTYPE_CERT] == NULL) ||
(lcconf->pathinfo[LC_PATHTYPE_SCRIPT] == NULL)) {
plog(LLV_ERROR, LOCATION, NULL, "privilege separation "
"require path cert and path script in the config file\n");
return -1;
}
if (socketpair(PF_LOCAL, SOCK_DGRAM, 0, privsep_sock) != 0) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate privsep_sock: %s\n", strerror(errno));
return -1;
}
switch (child_pid = fork()) {
case -1:
plog(LLV_ERROR, LOCATION, NULL, "Cannot fork privsep: %s\n",
strerror(errno));
return -1;
break;
case 0: /* Child: drop privileges */
if (lcconf->chroot != NULL) {
if (chdir(lcconf->chroot) != 0) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot chdir(%s): %s\n", lcconf->chroot,
strerror(errno));
return -1;
}
if (chroot(lcconf->chroot) != 0) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot chroot(%s): %s\n", lcconf->chroot,
strerror(errno));
return -1;
}
}
if (setgid(lcconf->gid) != 0) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot setgid(%d): %s\n", lcconf->gid,
strerror(errno));
return -1;
}
if (setegid(lcconf->gid) != 0) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot setegid(%d): %s\n", lcconf->gid,
strerror(errno));
return -1;
}
if (setuid(lcconf->uid) != 0) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot setuid(%d): %s\n", lcconf->uid,
strerror(errno));
return -1;
}
if (seteuid(lcconf->uid) != 0) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot seteuid(%d): %s\n", lcconf->uid,
strerror(errno));
return -1;
}
return 0;
break;
default: /* Parent: privilegied process */
break;
}
/*
* Close everything except the socketpair,
* and stdout if running in the forground.
*/
for (i = sysconf(_SC_OPEN_MAX); i > 0; i--) {
if (i == privsep_sock[0])
continue;
if (i == privsep_sock[1])
continue;
if ((f_foreground) && (i == 1))
continue;
(void)close(i);
}
/* Above trickery closed the log file, reopen it */
ploginit();
plog(LLV_INFO, LOCATION, NULL,
"racoon privilegied process running with PID %d\n", getpid());
#ifdef __NetBSD__
setproctitle("[priv]");
#endif
/*
* Don't catch any signal
* This duplicate session:signals[], which is static...
*/
signal(SIGHUP, SIG_DFL);
signal(SIGINT, SIG_DFL);
signal(SIGTERM, SIG_DFL);
signal(SIGUSR1, SIG_DFL);
signal(SIGUSR2, SIG_DFL);
signal(SIGCHLD, SIG_DFL);
while (1) {
size_t len;
struct privsep_com_msg *combuf;
struct privsep_com_msg *reply;
char *data;
size_t *buflen;
size_t totallen;
char *bufs[PRIVSEP_NBUF_MAX];
int i;
if (privsep_recv(privsep_sock[0], &combuf, &len) != 0)
goto out;
/* Safety checks and gather the data */
if (len < sizeof(*combuf)) {
plog(LLV_ERROR, LOCATION, NULL,
"corrupted privsep message (short buflen)\n");
goto out;
}
data = (char *)(combuf + 1);
totallen = sizeof(*combuf);
for (i = 0; i < PRIVSEP_NBUF_MAX; i++) {
bufs[i] = (char *)data;
data += combuf->bufs.buflen[i];
totallen += combuf->bufs.buflen[i];
}
if (totallen > len) {
plog(LLV_ERROR, LOCATION, NULL,
"corrupted privsep message (bufs too big)\n");
goto out;
}
/* Prepare the reply buffer */
if ((reply = racoon_malloc(sizeof(*reply))) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate reply buffer: %s\n",
strerror(errno));
goto out;
}
bzero(reply, sizeof(*reply));
reply->hdr.ac_cmd = combuf->hdr.ac_cmd;
reply->hdr.ac_len = sizeof(*reply);
switch(combuf->hdr.ac_cmd) {
/*
* XXX Improvement: instead of returning the key,
* stuff eay_get_pkcs1privkey and eay_get_x509sign
* together and sign the hash in the privilegied
* instance?
* pro: the key remains inaccessible to unpriv
* con: a compromised unpriv racoon can still sign anything
*/
case PRIVSEP_EAY_GET_PKCS1PRIVKEY: {
vchar_t *privkey;
/* Make sure the string is NULL terminated */
if (safety_check(combuf, 0) != 0)
break;
bufs[0][combuf->bufs.buflen[0] - 1] = '\0';
if (unsafe_path(bufs[0], LC_PATHTYPE_CERT) != 0) {
plog(LLV_ERROR, LOCATION, NULL,
"privsep_eay_get_pkcs1privkey: "
"unsafe cert \"%s\"\n", bufs[0]);
}
plog(LLV_DEBUG, LOCATION, NULL,
"eay_get_pkcs1privkey(\"%s\")\n", bufs[0]);
if ((privkey = eay_get_pkcs1privkey(bufs[0])) == NULL){
reply->hdr.ac_errno = errno;
break;
}
reply->bufs.buflen[0] = privkey->l;
reply->hdr.ac_len = sizeof(*reply) + privkey->l;
reply = racoon_realloc(reply, reply->hdr.ac_len);
if (reply == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate reply buffer: %s\n",
strerror(errno));
goto out;
}
memcpy(reply + 1, privkey->v, privkey->l);
vfree(privkey);
break;
}
case PRIVSEP_SCRIPT_EXEC: {
char *script;
int name;
char **envp = NULL;
int envc = 0;
int count = 0;
int i;
/*
* First count the bufs, and make sure strings
* are NULL terminated.
*
* We expect: script, name, envp[], void
*/
if (safety_check(combuf, 0) != 0)
break;
bufs[0][combuf->bufs.buflen[0] - 1] = '\0';
count++; /* script */
count++; /* name */
for (; count < PRIVSEP_NBUF_MAX; count++) {
if (combuf->bufs.buflen[count] == 0)
break;
bufs[count]
[combuf->bufs.buflen[count] - 1] = '\0';
envc++;
}
/* count a void buf and perform safety check */
count++;
if (count >= PRIVSEP_NBUF_MAX) {
plog(LLV_ERROR, LOCATION, NULL,
"privsep_script_exec: too many args\n");
goto out;
}
/*
* Allocate the arrays for envp
*/
envp = racoon_malloc((envc + 1) * sizeof(char *));
if (envp == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"cannot allocate memory: %s\n",
strerror(errno));
goto out;
}
bzero(envp, (envc + 1) * sizeof(char *));
/*
* Populate script, name and envp
*/
count = 0;
script = bufs[count++];
if (combuf->bufs.buflen[count] != sizeof(name)) {
plog(LLV_ERROR, LOCATION, NULL,
"privsep_script_exec: corrupted message\n");
goto out;
}
memcpy((char *)&name, bufs[count++], sizeof(name));
for (i = 0; combuf->bufs.buflen[count]; count++)
envp[i++] = bufs[count];
count++; /* void */
plog(LLV_DEBUG, LOCATION, NULL,
"script_exec(\"%s\", %d, %p)\n",
script, name, envp);
/*
* Check env for dangerous variables
* Check script path and name
* Perform fork and execve
*/
if ((unsafe_env(envp) == 0) &&
(unknown_name(name) == 0) &&
(unsafe_path(script, LC_PATHTYPE_SCRIPT) == 0))
(void)script_exec(script, name, envp);
else
plog(LLV_ERROR, LOCATION, NULL,
"privsep_script_exec: "
"unsafe script \"%s\"\n", script);
racoon_free(envp);
break;
}
case PRIVSEP_GETPSK: {
vchar_t *psk;
int keylen;
/* Make sure the string is NULL terminated */
if (safety_check(combuf, 0) != 0)
break;
bufs[0][combuf->bufs.buflen[0] - 1] = '\0';
if (combuf->bufs.buflen[1] != sizeof(keylen)) {
plog(LLV_ERROR, LOCATION, NULL,
"privsep_getpsk: corrupted message\n");
goto out;
}
memcpy(&keylen, bufs[1], sizeof(keylen));
plog(LLV_DEBUG, LOCATION, NULL,
"getpsk(\"%s\", %d)\n", bufs[0], keylen);
if ((psk = getpsk(bufs[0], keylen)) == NULL) {
reply->hdr.ac_errno = errno;
break;
}
reply->bufs.buflen[0] = psk->l;
reply->hdr.ac_len = sizeof(*reply) + psk->l;
reply = racoon_realloc(reply, reply->hdr.ac_len);
if (reply == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate reply buffer: %s\n",
strerror(errno));
goto out;
}
memcpy(reply + 1, psk->v, psk->l);
vfree(psk);
break;
}
#ifdef ENABLE_HYBRID
case PRIVSEP_ACCOUNTING_SYSTEM: {
int pool_size;
int port;
int inout;
struct sockaddr *raddr;
if (safety_check(combuf, 0) != 0)
break;
if (safety_check(combuf, 1) != 0)
break;
if (safety_check(combuf, 2) != 0)
break;
if (safety_check(combuf, 3) != 0)
break;
memcpy(&port, bufs[0], sizeof(port));
raddr = (struct sockaddr *)bufs[1];
bufs[2][combuf->bufs.buflen[2] - 1] = '\0';
memcpy(&inout, bufs[3], sizeof(port));
if (port_check(port) != 0)
break;
plog(LLV_DEBUG, LOCATION, NULL,
"accounting_system(%d, %s, %s)\n",
port, saddr2str(raddr), bufs[2]);
errno = 0;
if (isakmp_cfg_accounting_system(port,
raddr, bufs[2], inout) != 0) {
if (errno == 0)
reply->hdr.ac_errno = EINVAL;
else
reply->hdr.ac_errno = errno;
}
break;
}
case PRIVSEP_XAUTH_LOGIN_SYSTEM: {
if (safety_check(combuf, 0) != 0)
break;
bufs[0][combuf->bufs.buflen[0] - 1] = '\0';
if (safety_check(combuf, 1) != 0)
break;
bufs[1][combuf->bufs.buflen[1] - 1] = '\0';
plog(LLV_DEBUG, LOCATION, NULL,
"xauth_login_system(\"%s\", <password>)\n",
bufs[0]);
errno = 0;
if (xauth_login_system(bufs[0], bufs[1]) != 0) {
if (errno == 0)
reply->hdr.ac_errno = EINVAL;
else
reply->hdr.ac_errno = errno;
}
break;
}
#ifdef HAVE_LIBPAM
case PRIVSEP_ACCOUNTING_PAM: {
int port;
int inout;
int pool_size;
if (safety_check(combuf, 0) != 0)
break;
if (safety_check(combuf, 1) != 0)
break;
if (safety_check(combuf, 2) != 0)
break;
memcpy(&port, bufs[0], sizeof(port));
memcpy(&inout, bufs[1], sizeof(inout));
memcpy(&pool_size, bufs[2], sizeof(pool_size));
if (pool_size != isakmp_cfg_config.pool_size)
if (isakmp_cfg_resize_pool(pool_size) != 0)
break;
if (port_check(port) != 0)
break;
plog(LLV_DEBUG, LOCATION, NULL,
"isakmp_cfg_accounting_pam(%d, %d)\n",
port, inout);
errno = 0;
if (isakmp_cfg_accounting_pam(port, inout) != 0) {
if (errno == 0)
reply->hdr.ac_errno = EINVAL;
else
reply->hdr.ac_errno = errno;
}
break;
}
case PRIVSEP_XAUTH_LOGIN_PAM: {
int port;
int pool_size;
struct sockaddr *raddr;
if (safety_check(combuf, 0) != 0)
break;
if (safety_check(combuf, 1) != 0)
break;
if (safety_check(combuf, 2) != 0)
break;
if (safety_check(combuf, 3) != 0)
break;
if (safety_check(combuf, 4) != 0)
break;
memcpy(&port, bufs[0], sizeof(port));
memcpy(&pool_size, bufs[1], sizeof(pool_size));
raddr = (struct sockaddr *)bufs[2];
bufs[3][combuf->bufs.buflen[3] - 1] = '\0';
bufs[4][combuf->bufs.buflen[4] - 1] = '\0';
if (pool_size != isakmp_cfg_config.pool_size)
if (isakmp_cfg_resize_pool(pool_size) != 0)
break;
if (port_check(port) != 0)
break;
plog(LLV_DEBUG, LOCATION, NULL,
"xauth_login_pam(%d, %s, \"%s\", <password>)\n",
port, saddr2str(raddr), bufs[3]);
errno = 0;
if (xauth_login_pam(port,
raddr, bufs[3], bufs[4]) != 0) {
if (errno == 0)
reply->hdr.ac_errno = EINVAL;
else
reply->hdr.ac_errno = errno;
}
break;
}
case PRIVSEP_CLEANUP_PAM: {
int port;
int pool_size;
if (safety_check(combuf, 0) != 0)
break;
if (safety_check(combuf, 1) != 0)
break;
memcpy(&port, bufs[0], sizeof(port));
memcpy(&pool_size, bufs[1], sizeof(pool_size));
if (pool_size != isakmp_cfg_config.pool_size)
if (isakmp_cfg_resize_pool(pool_size) != 0)
break;
if (port_check(port) != 0)
break;
plog(LLV_DEBUG, LOCATION, NULL,
"cleanup_pam(%d)\n", port);
cleanup_pam(port);
reply->hdr.ac_errno = 0;
break;
}
#endif /* HAVE_LIBPAM */
#endif /* ENABLE_HYBRID */
default:
plog(LLV_ERROR, LOCATION, NULL,
"unexpected privsep command %d\n",
combuf->hdr.ac_cmd);
goto out;
break;
}
/* This frees reply */
if (privsep_send(privsep_sock[0],
reply, reply->hdr.ac_len) != 0)
goto out;
racoon_free(combuf);
}
out:
plog(LLV_INFO, LOCATION, NULL, "privsep exit\n");
_exit(0);
}
vchar_t *
privsep_eay_get_pkcs1privkey(path)
char *path;
{
vchar_t *privkey;
struct privsep_com_msg *msg;
size_t len;
if (geteuid() == 0)
return eay_get_pkcs1privkey(path);
len = sizeof(*msg) + strlen(path) + 1;
if ((msg = racoon_malloc(len)) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate memory: %s\n", strerror(errno));
return NULL;
}
bzero(msg, len);
msg->hdr.ac_cmd = PRIVSEP_EAY_GET_PKCS1PRIVKEY;
msg->hdr.ac_len = len;
msg->bufs.buflen[0] = len - sizeof(*msg);
memcpy(msg + 1, path, msg->bufs.buflen[0]);
if (privsep_send(privsep_sock[1], msg, len) != 0)
return NULL;
if (privsep_recv(privsep_sock[1], &msg, &len) != 0)
return NULL;
if (msg->hdr.ac_errno != 0) {
errno = msg->hdr.ac_errno;
goto out;
}
if ((privkey = vmalloc(len - sizeof(*msg))) == NULL)
goto out;
memcpy(privkey->v, msg + 1, privkey->l);
racoon_free(msg);
return privkey;
out:
racoon_free(msg);
return NULL;
}
/*
* No prigilege separation trick here, we just open PFKEY before
* dropping root privs and we remember it later.
*/
static int pfkey_socket = -1;
int
privsep_pfkey_open(void)
{
int ps;
if (pfkey_socket != -1)
return pfkey_socket;
ps = pfkey_open();
if (ps != -1)
pfkey_socket = ps;
return ps;
}
/*
* Consequence of the above trickery: don't
* really close PFKEY as we never re-open it.
*/
void
privsep_pfkey_close(ps)
int ps;
{
return;
}
int
privsep_script_exec(script, name, envp)
char *script;
int name;
char *const envp[];
{
int count = 0;
char *const *c;
char *data;
size_t len;
struct privsep_com_msg *msg;
if (geteuid() == 0)
return script_exec(script, name, envp);
if ((msg = racoon_malloc(sizeof(*msg))) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate memory: %s\n", strerror(errno));
return -1;
}
bzero(msg, sizeof(*msg));
msg->hdr.ac_cmd = PRIVSEP_SCRIPT_EXEC;
msg->hdr.ac_len = sizeof(*msg);
/*
* We send:
* script, name, envp[0], ... envp[N], void
*/
/*
* Safety check on the counts: PRIVSEP_NBUF_MAX max
*/
count = 0;
count++; /* script */
count++; /* name */
for (c = envp; *c; c++) /* envp */
count++;
count++; /* void */
if (count > PRIVSEP_NBUF_MAX) {
plog(LLV_ERROR, LOCATION, NULL, "Unexpected error: "
"privsep_script_exec count > PRIVSEP_NBUF_MAX\n");
racoon_free(msg);
return -1;
}
/*
* Compute the length
*/
count = 0;
msg->bufs.buflen[count] = strlen(script) + 1; /* script */
msg->hdr.ac_len += msg->bufs.buflen[count++];
msg->bufs.buflen[count] = sizeof(name); /* name */
msg->hdr.ac_len += msg->bufs.buflen[count++];
for (c = envp; *c; c++) { /* envp */
msg->bufs.buflen[count] = strlen(*c) + 1;
msg->hdr.ac_len += msg->bufs.buflen[count++];
}
msg->bufs.buflen[count] = 0; /* void */
msg->hdr.ac_len += msg->bufs.buflen[count++];
if ((msg = racoon_realloc(msg, msg->hdr.ac_len)) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate memory: %s\n", strerror(errno));
return -1;
}
/*
* Now copy the data
*/
data = (char *)(msg + 1);
count = 0;
memcpy(data, (char *)script, msg->bufs.buflen[count]); /* script */
data += msg->bufs.buflen[count++];
memcpy(data, (char *)&name, msg->bufs.buflen[count]); /* name */
data += msg->bufs.buflen[count++];
for (c = envp; *c; c++) { /* envp */
memcpy(data, *c, msg->bufs.buflen[count]);
data += msg->bufs.buflen[count++];
}
count++; /* void */
/*
* And send it!
*/
if (privsep_send(privsep_sock[1], msg, msg->hdr.ac_len) != 0)
return -1;
if (privsep_recv(privsep_sock[1], &msg, &len) != 0)
return -1;
if (msg->hdr.ac_errno != 0) {
errno = msg->hdr.ac_errno;
racoon_free(msg);
return -1;
}
racoon_free(msg);
return 0;
}
vchar_t *
privsep_getpsk(str, keylen)
const char *str;
int keylen;
{
vchar_t *psk;
struct privsep_com_msg *msg;
size_t len;
int *keylenp;
char *data;
if (geteuid() == 0)
return getpsk(str, keylen);
len = sizeof(*msg) + strlen(str) + 1 + sizeof(keylen);
if ((msg = racoon_malloc(len)) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate memory: %s\n", strerror(errno));
return NULL;
}
bzero(msg, len);
msg->hdr.ac_cmd = PRIVSEP_GETPSK;
msg->hdr.ac_len = len;
data = (char *)(msg + 1);
msg->bufs.buflen[0] = strlen(str) + 1;
memcpy(data, str, msg->bufs.buflen[0]);
data += msg->bufs.buflen[0];
msg->bufs.buflen[1] = sizeof(keylen);
memcpy(data, &keylen, sizeof(keylen));
if (privsep_send(privsep_sock[1], msg, len) != 0)
return NULL;
if (privsep_recv(privsep_sock[1], &msg, &len) != 0)
return NULL;
if (msg->hdr.ac_errno != 0) {
errno = msg->hdr.ac_errno;
goto out;
}
if ((psk = vmalloc(len - sizeof(*msg))) == NULL)
goto out;
memcpy(psk->v, msg + 1, psk->l);
racoon_free(msg);
return psk;
out:
racoon_free(msg);
return NULL;
}
#ifdef ENABLE_HYBRID
int
privsep_xauth_login_system(usr, pwd)
char *usr;
char *pwd;
{
struct privsep_com_msg *msg;
size_t len;
char *data;
if (geteuid() == 0)
return xauth_login_system(usr, pwd);
len = sizeof(*msg) + strlen(usr) + 1 + strlen(pwd) + 1;
if ((msg = racoon_malloc(len)) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate memory: %s\n", strerror(errno));
return -1;
}
bzero(msg, len);
msg->hdr.ac_cmd = PRIVSEP_XAUTH_LOGIN_SYSTEM;
msg->hdr.ac_len = len;
data = (char *)(msg + 1);
msg->bufs.buflen[0] = strlen(usr) + 1;
memcpy(data, usr, msg->bufs.buflen[0]);
data += msg->bufs.buflen[0];
msg->bufs.buflen[1] = strlen(pwd) + 1;
memcpy(data, pwd, msg->bufs.buflen[1]);
if (privsep_send(privsep_sock[1], msg, len) != 0)
return -1;
if (privsep_recv(privsep_sock[1], &msg, &len) != 0)
return -1;
if (msg->hdr.ac_errno != 0) {
racoon_free(msg);
return -1;
}
racoon_free(msg);
return 0;
}
int
privsep_accounting_system(port, raddr, usr, inout)
int port;
struct sockaddr *raddr;
char *usr;
int inout;
{
struct privsep_com_msg *msg;
size_t len;
char *data;
int result;
if (geteuid() == 0)
return isakmp_cfg_accounting_system(port, raddr,
usr, inout);
len = sizeof(*msg)
+ sizeof(port)
+ sysdep_sa_len(raddr)
+ strlen(usr) + 1
+ sizeof(inout);
if ((msg = racoon_malloc(len)) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate memory: %s\n", strerror(errno));
return -1;
}
bzero(msg, len);
msg->hdr.ac_cmd = PRIVSEP_ACCOUNTING_SYSTEM;
msg->hdr.ac_len = len;
msg->bufs.buflen[0] = sizeof(port);
msg->bufs.buflen[1] = sysdep_sa_len(raddr);
msg->bufs.buflen[2] = strlen(usr) + 1;
msg->bufs.buflen[3] = sizeof(inout);
data = (char *)(msg + 1);
memcpy(data, &port, msg->bufs.buflen[0]);
data += msg->bufs.buflen[0];
memcpy(data, raddr, msg->bufs.buflen[1]);
data += msg->bufs.buflen[1];
memcpy(data, usr, msg->bufs.buflen[2]);
data += msg->bufs.buflen[2];
memcpy(data, &inout, msg->bufs.buflen[3]);
if (privsep_send(privsep_sock[1], msg, len) != 0)
return -1;
if (privsep_recv(privsep_sock[1], &msg, &len) != 0)
return -1;
if (msg->hdr.ac_errno != 0) {
errno = msg->hdr.ac_errno;
goto out;
}
racoon_free(msg);
return 0;
out:
racoon_free(msg);
return -1;
}
static int
port_check(port)
int port;
{
if ((port < 0) || (port >= isakmp_cfg_config.pool_size)) {
plog(LLV_ERROR, LOCATION, NULL,
"privsep: port %d outside of allowed range [0,%zu]\n",
port, isakmp_cfg_config.pool_size - 1);
return -1;
}
return 0;
}
#endif
static int
safety_check(msg, index)
struct privsep_com_msg *msg;
int index;
{
if (index >= PRIVSEP_NBUF_MAX) {
plog(LLV_ERROR, LOCATION, NULL,
"privsep: Corrupted message, too many buffers\n");
return -1;
}
if (msg->bufs.buflen[index] == 0) {
plog(LLV_ERROR, LOCATION, NULL,
"privsep: Corrupted message, unexpected void buffer\n");
return -1;
}
return 0;
}
/*
* Filter unsafe environement variables
*/
static int
unsafe_env(envp)
char *const *envp;
{
char *const *e;
char *const *be;
char *const bad_env[] = { "PATH=", "LD_LIBRARY_PATH=", "IFS=", NULL };
for (e = envp; *e; e++) {
for (be = bad_env; *be; be++) {
if (strncmp(*e, *be, strlen(*be)) == 0) {
goto found;
}
}
}
return 0;
found:
plog(LLV_ERROR, LOCATION, NULL,
"privsep_script_exec: unsafe environement variable\n");
return -1;
}
/*
* Check path safety
*/
static int
unsafe_path(script, pathtype)
char *script;
int pathtype;
{
char *path;
char rpath[MAXPATHLEN + 1];
size_t len;
if (script == NULL)
return -1;
path = lcconf->pathinfo[pathtype];
/* No path was given for scripts: skip the check */
if (path == NULL)
return 0;
if (realpath(script, rpath) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"script path \"%s\" is invalid\n", script);
return -1;
}
len = strlen(path);
if (strncmp(path, rpath, len) != 0)
return -1;
return 0;
}
static int
unknown_name(name)
int name;
{
if ((name < 0) || (name > SCRIPT_MAX)) {
plog(LLV_ERROR, LOCATION, NULL,
"privsep_script_exec: unsafe name index\n");
return -1;
}
return 0;
}
#ifdef HAVE_LIBPAM
int
privsep_accounting_pam(port, inout)
int port;
int inout;
{
struct privsep_com_msg *msg;
size_t len;
int *port_data;
int *inout_data;
int *pool_size_data;
int result;
if (geteuid() == 0)
return isakmp_cfg_accounting_pam(port, inout);
len = sizeof(*msg)
+ sizeof(port)
+ sizeof(inout)
+ sizeof(isakmp_cfg_config.pool_size);
if ((msg = racoon_malloc(len)) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate memory: %s\n", strerror(errno));
return -1;
}
bzero(msg, len);
msg->hdr.ac_cmd = PRIVSEP_ACCOUNTING_PAM;
msg->hdr.ac_len = len;
msg->bufs.buflen[0] = sizeof(port);
msg->bufs.buflen[1] = sizeof(inout);
msg->bufs.buflen[2] = sizeof(isakmp_cfg_config.pool_size);
port_data = (int *)(msg + 1);
inout_data = (int *)(port_data + 1);
pool_size_data = (int *)(inout_data + 1);
*port_data = port;
*inout_data = inout;
*pool_size_data = isakmp_cfg_config.pool_size;
if (privsep_send(privsep_sock[1], msg, len) != 0)
return -1;
if (privsep_recv(privsep_sock[1], &msg, &len) != 0)
return -1;
if (msg->hdr.ac_errno != 0) {
errno = msg->hdr.ac_errno;
goto out;
}
racoon_free(msg);
return 0;
out:
racoon_free(msg);
return -1;
}
int
privsep_xauth_login_pam(port, raddr, usr, pwd)
int port;
struct sockaddr *raddr;
char *usr;
char *pwd;
{
struct privsep_com_msg *msg;
size_t len;
char *data;
int result;
if (geteuid() == 0)
return xauth_login_pam(port, raddr, usr, pwd);
len = sizeof(*msg)
+ sizeof(port)
+ sizeof(isakmp_cfg_config.pool_size)
+ sysdep_sa_len(raddr)
+ strlen(usr) + 1
+ strlen(pwd) + 1;
if ((msg = racoon_malloc(len)) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate memory: %s\n", strerror(errno));
return -1;
}
bzero(msg, len);
msg->hdr.ac_cmd = PRIVSEP_XAUTH_LOGIN_PAM;
msg->hdr.ac_len = len;
msg->bufs.buflen[0] = sizeof(port);
msg->bufs.buflen[1] = sizeof(isakmp_cfg_config.pool_size);
msg->bufs.buflen[2] = sysdep_sa_len(raddr);
msg->bufs.buflen[3] = strlen(usr) + 1;
msg->bufs.buflen[4] = strlen(pwd) + 1;
data = (char *)(msg + 1);
memcpy(data, &port, msg->bufs.buflen[0]);
data += msg->bufs.buflen[0];
memcpy(data, &isakmp_cfg_config.pool_size, msg->bufs.buflen[1]);
data += msg->bufs.buflen[1];
memcpy(data, raddr, msg->bufs.buflen[2]);
data += msg->bufs.buflen[2];
memcpy(data, usr, msg->bufs.buflen[3]);
data += msg->bufs.buflen[3];
memcpy(data, pwd, msg->bufs.buflen[4]);
if (privsep_send(privsep_sock[1], msg, len) != 0)
return -1;
if (privsep_recv(privsep_sock[1], &msg, &len) != 0)
return -1;
if (msg->hdr.ac_errno != 0) {
errno = msg->hdr.ac_errno;
goto out;
}
racoon_free(msg);
return 0;
out:
racoon_free(msg);
return -1;
}
void
privsep_cleanup_pam(port)
int port;
{
struct privsep_com_msg *msg;
size_t len;
char *data;
int result;
if (geteuid() == 0)
return cleanup_pam(port);
len = sizeof(*msg)
+ sizeof(port)
+ sizeof(isakmp_cfg_config.pool_size);
if ((msg = racoon_malloc(len)) == NULL) {
plog(LLV_ERROR, LOCATION, NULL,
"Cannot allocate memory: %s\n", strerror(errno));
return;
}
bzero(msg, len);
msg->hdr.ac_cmd = PRIVSEP_CLEANUP_PAM;
msg->hdr.ac_len = len;
msg->bufs.buflen[0] = sizeof(port);
msg->bufs.buflen[1] = sizeof(isakmp_cfg_config.pool_size);
data = (char *)(msg + 1);
memcpy(data, &port, msg->bufs.buflen[0]);
data += msg->bufs.buflen[0];
memcpy(data, &isakmp_cfg_config.pool_size, msg->bufs.buflen[1]);
if (privsep_send(privsep_sock[1], msg, len) != 0)
return;
if (privsep_recv(privsep_sock[1], &msg, &len) != 0)
return;
if (msg->hdr.ac_errno != 0)
errno = msg->hdr.ac_errno;
racoon_free(msg);
return;
}
#endif