3 * $Id: daemon.c,v 1.10 1998/04/23 13:23:09 mdw Exp $
5 * Running a `become' daemon
10 /*----- Licensing notice --------------------------------------------------*
12 * This file is part of `become'
14 * `Become' is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
19 * `Become' is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
24 * You should have received a copy of the GNU General Public License
25 * along with `become'; if not, write to the Free Software Foundation,
26 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
29 /*----- Revision history --------------------------------------------------*
32 * Revision 1.10 1998/04/23 13:23:09 mdw
33 * Support new interface to configuration file parser.
35 * Revision 1.9 1998/01/12 16:45:59 mdw
38 * Revision 1.8 1997/09/26 09:14:58 mdw
39 * Merged blowfish branch into trunk.
41 * Revision 1.7.2.1 1997/09/26 09:08:05 mdw
42 * Use the Blowfish encryption algorithm instead of IDEA. This is partly
43 * because I prefer Blowfish (without any particularly strong evidence) but
44 * mainly because IDEA is patented and Blowfish isn't.
46 * Revision 1.7 1997/09/17 10:23:23 mdw
47 * Fix a typo. Port numbers are in network order now, so don't change them.
49 * Revision 1.6 1997/09/09 18:17:06 mdw
50 * Allow default port to be given as a service name or port number.
52 * Revision 1.5 1997/08/20 16:17:10 mdw
53 * More sensible restart routine: `_reinit' functions replaced by `_end' and
56 * Revision 1.4 1997/08/07 10:00:37 mdw
57 * (Log entry for previous version is bogus.) Read netgroups database.
58 * Give up privileges permanently on startup.
60 * Revision 1.2 1997/08/04 10:24:21 mdw
61 * Sources placed under CVS control.
63 * Revision 1.1 1997/07/21 13:47:50 mdw
68 /*----- Header files ------------------------------------------------------*/
70 /* --- ANSI headers --- */
79 /* --- Unix headers --- */
81 #include <sys/types.h>
83 #include <sys/socket.h>
85 #include <netinet/in.h>
87 #include <arpa/inet.h>
93 /* --- Local headers --- */
109 /*----- Arbitrary constants -----------------------------------------------*/
111 #define daemon__awakeEvery (30 * 60) /* Awaken this often to rescan */
113 /*----- Static variables --------------------------------------------------*/
115 static int daemon__running = 0; /* Am I running as a daemon? */
116 static int daemon__port = -1; /* No particular port yet */
117 static volatile sig_atomic_t daemon__rescan = 0; /* Rescan as soon as poss */
118 #define daemon__signum daemon__rescan /* Alias for readbility */
119 static int daemon__readKey = 0; /* Have I read a key? */
120 static unsigned char daemon__key[BLOWFISH_KEYSIZE]; /* Encryption key */
121 static jmp_buf daemon__dieBuf; /* Jump here to kill the daemon */
123 /*----- Main code ---------------------------------------------------------*/
125 /* --- @daemon_usePort@ --- *
127 * Arguments: @int port@ = port to use, please
131 * Use: Instructs the daemon to listen to the given port.
134 void daemon_usePort(int port)
139 /* --- @daemon_readKey@ --- *
141 * Arguments: @const char *kf@ = name of file containing key
145 * Use: Instructs the daemon to read the named key file.
148 void daemon_readKey(const char *kf)
152 if (!daemon__running)
155 if ((fp = fopen(kf, "r")) == 0) {
156 syslog(LOG_WARNING, "couldn't read key file: %e");
159 tx_getBits(daemon__key, 128, fp);
165 /* --- @daemon__readConfig@ --- *
167 * Arguments: @const char *cf@ = pointer to configuration file to use
169 * Returns: Zero if it worked, nonzero if it hurt...
171 * Use: Reads the configuration file, and other things.
174 static int daemon__readConfig(const char *cf)
179 if ((fp = fopen(cf, "r")) == 0)
184 if (!daemon__readKey)
185 daemon_readKey(file_KEY);
187 T( trace(TRACE_DAEMON, "daemon: read config file"); )
191 /* --- @daemon__restart@ --- *
193 * Arguments: @int sig@ = the signal number
197 * Use: Handles signals. Causes the configuration file to be reread.
200 static void daemon__restart(int sig)
203 signal(sig, daemon__restart);
206 /* --- @daemon__die@ --- *
208 * Arguments: @int sig@ = the signal number
210 * Returns: via @longjmp@
212 * Use: Handles other signals. Causes the daemon to die.
215 static void daemon__die(int sig)
217 daemon__signum = sig;
218 longjmp(daemon__dieBuf, 1);
221 /* --- @daemon__read@ --- *
223 * Arguments: @int fd@ = socket handle
227 * Use: Examines a buffer, and returns a response.
230 void daemon__read(int fd)
232 unsigned char buff[65536]; /* Buffer for incoming packets */
233 unsigned char rpl[crp_size]; /* Buffer for outgoing replies */
234 struct sockaddr_in sin; /* Address of packet sender */
235 char sender[64]; /* Sender's hostname (resolved) */
236 unsigned char sk[BLOWFISH_KEYSIZE]; /* Session key for reply */
237 request rq; /* Request buffer for verification */
239 /* --- Read the message --- */
242 int slen = sizeof(sin);
244 if (recvfrom(fd, (char *)buff, sizeof(buff), 0,
245 (struct sockaddr *)&sin, &slen) < 0) {
246 T( trace(TRACE_DAEMON, "daemon: error reading packet: %s",
248 syslog(LOG_INFO, "duff packet received: %e");
253 /* --- Resolve the host name --- */
256 struct hostent *he = gethostbyaddr((char *)&sin.sin_addr,
257 sizeof(sin.sin_addr),
261 he ? he->h_name : inet_ntoa(sin.sin_addr),
263 syslog(LOG_DEBUG, "packet received from %s", sender);
264 T( trace(TRACE_DAEMON, "daemon: received request from %s", sender); )
267 /* --- Unpack the block --- */
269 if (crypt_unpackRequest(&rq, buff, daemon__key, sk, rpl) == 0) {
271 T( trace(TRACE_DAEMON, "daemon: received corrupt or invalid request"); )
272 syslog(LOG_INFO, "packet from %s rejected", sender);
277 /* --- Fill in the sender's address in the request block --- */
279 rq.host = sin.sin_addr;
281 /* --- Build a reply block --- */
284 int answer = rule_check(&rq);
285 syslog(LOG_INFO, "request from %s for %i to become %i to run %s %s",
286 sender, rq.from, rq.to, rq.cmd, answer ? "granted" : "denied");
287 crypt_packReply(rpl, sk, answer);
291 /* --- Send the reply off --- */
293 sendto(fd, (char *)rpl, crp_size, 0, (struct sockaddr *)&sin, sizeof(sin));
294 T( trace(TRACE_DAEMON, "daemon: reply sent"); )
298 /* --- @daemon_init@ --- *
300 * Arguments: @const char *cf@ = pointer to name of configuration file
301 * @int port@ = port to listen to, or %$-1$% for default
305 * Use: Starts `become' up in daemon mode.
308 void daemon_init(const char *cf, int port)
312 /* --- Remove my root privileges --- *
314 * Just in case there's anything dodgy in my configuration file, or the
315 * user wants me to start on a funny port.
320 /* --- Initialise bits of the program --- */
330 openlog(quis(), 0, LOG_DAEMON);
331 syslog(LOG_NOTICE, "starting up");
333 if (daemon__readConfig(cf))
334 die("couldn't read configuration file");
336 /* --- Decide on a port to use --- *
338 * If I don't have a port yet (e.g., from the configuration file) then
339 * look it up in /etc/services under whatever name I was started as.
342 if (daemon__port == 0) {
343 struct servent *se = getservbyname(quis(), "udp");
345 die("no idea which port to listen to");
346 daemon__port = se->s_port;
349 /* --- Now set up a socket --- */
352 struct sockaddr_in sin;
354 if ((s = socket(PF_INET, SOCK_DGRAM, 0)) == -1)
355 die("couldn't create socket: %s", strerror(errno));
356 sin.sin_family = AF_INET;
357 sin.sin_port = daemon__port;
358 sin.sin_addr.s_addr = htonl(INADDR_ANY);
359 if (bind(s, (struct sockaddr *)&sin, sizeof(sin))) {
360 die("couldn't bind socket to port %i: %s",
361 ntohs(daemon__port), strerror(errno));
365 /* --- Fork off into the sunset --- */
372 /* --- Make a background process --- */
375 die("couldn't fork daemon: %s", strerror(errno));
379 /* --- Disconnect from the terminal --- */
383 /* --- Write my process id to a file --- */
385 if ((fp = fopen(file_PID, "w")) != 0) {
386 fprintf(fp, "%lu\n", (unsigned long)getpid());
389 T( trace(TRACE_DAEMON, "daemon: forked to pid %li", (long)getpid()); )
393 /* --- Program in daemon death mode --- */
395 if (setjmp(daemon__dieBuf)) {
397 if (daemon__signum == SIGQUIT && tracing() & TRACE_RULE) {
399 signal(SIGQUIT, daemon__die);
403 T( trace(TRACE_DAEMON, "daemon: killed by signal %i",
405 syslog(LOG_NOTICE, "killed by signal type %i", daemon__signum);
411 /* --- Set signal handlers --- */
413 signal(SIGHUP, daemon__restart);
414 signal(SIGQUIT, daemon__die);
415 signal(SIGINT, daemon__die);
416 signal(SIGTERM, daemon__die);
417 signal(SIGSEGV, daemon__die);
418 signal(SIGFPE, daemon__die);
419 signal(SIGBUS, daemon__die);
422 /* --- Now wait for something exciting to happen --- *
424 * Actually, every so often (5 minutes, perhaps) I need to wake up and
425 * rescan the users to see whether they've changed. Time to play with
432 /* --- Find when I am, and thus when I need to be awoken again --- */
434 when = time(0) + daemon__awakeEvery;
440 /* --- Set up the file descriptor tables --- */
445 /* --- Now wait for something interesting --- */
447 T( trace(TRACE_DAEMON, "daemon: waiting for requests"); )
448 i = select(FD_SETSIZE, &fds, 0, 0, 0);
450 /* --- Now, see if I need to rescan the config --- */
452 if (daemon__rescan || time(0) - when > 0) {
454 syslog(LOG_INFO, "rescanning configuration file");
465 if (daemon__readConfig(cf))
466 syslog(LOG_ERR, "error reading configuration file");
467 when = time(0) + daemon__awakeEvery;
470 /* --- Read the data from the request --- */
478 /*----- That's all, folks -------------------------------------------------*/