3 * $Id: daemon.c,v 1.1 1997/07/21 13:47:50 mdw Exp $
5 * Running a `become' daemon
10 /*----- Licencing notice --------------------------------------------------*
12 * This file is part of `become'
14 * `Become' is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2 of the License, or
17 * (at your option) any later version.
19 * `Become' is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
24 * You should have received a copy of the GNU General Public License
25 * along with `become'; if not, write to the Free Software
26 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
29 /*----- Revision history --------------------------------------------------*
32 * Revision 1.1 1997/07/21 13:47:50 mdw
37 /*----- Header files ------------------------------------------------------*/
39 /* --- ANSI headers --- */
48 /* --- Unix headers --- */
50 #include <sys/types.h>
52 #include <sys/socket.h>
54 #include <netinet/in.h>
56 #include <arpa/inet.h>
62 /* --- Local headers --- */
77 /*----- Arbitrary constants -----------------------------------------------*/
79 #define daemon__awakeEvery (5 * 60) /* Awaken this often to rescan */
81 /*----- Static variables --------------------------------------------------*/
83 static int daemon__running = 0; /* Am I running as a daemon? */
84 static int daemon__port = -1; /* No particular port yet */
85 static volatile sig_atomic_t daemon__rescan = 0; /* Rescan as soon as poss */
86 #define daemon__signum daemon__rescan /* Alias for readbility */
87 static int daemon__readKey = 0; /* Have I read a key? */
88 static unsigned char daemon__key[IDEA_KEYSIZE]; /* encryption key */
89 static jmp_buf daemon__dieBuf; /* Jump here to kill the daemon */
91 /*----- Main code ---------------------------------------------------------*/
93 /* --- @daemon_usePort@ --- *
95 * Arguments: @int port@ = port to use, please
99 * Use: Instructs the daemon to listen to the given port.
102 void daemon_usePort(int port)
107 /* --- @daemon_readKey@ --- *
109 * Arguments: @const char *kf@ = name of file containing key
113 * Use: Instructs the daemon to read the named key file.
116 void daemon_readKey(const char *kf)
120 if (!daemon__running)
123 if ((fp = fopen(kf, "r")) == 0) {
124 syslog(LOG_WARNING, "couldn't read key file: %e");
127 tx_getBits(daemon__key, 128, fp);
133 /* --- @daemon__readConfig@ --- *
135 * Arguments: @const char *cf@ = pointer to configuration file to use
137 * Returns: Zero if it worked, nonzero if it hurt...
139 * Use: Reads the configuration file, and other things.
142 static int daemon__readConfig(const char *cf)
147 if ((fp = fopen(cf, "r")) == 0)
152 if (!daemon__readKey)
153 daemon_readKey(file_KEY);
158 /* --- @daemon__restart@ --- *
160 * Arguments: @int sig@ = the signal number
164 * Use: Handles signals. Causes the configuration file to be reread.
167 static void daemon__restart(int sig)
170 signal(sig, daemon__restart);
173 /* --- @daemon__die@ --- *
175 * Arguments: @int sig@ = the signal number
177 * Returns: via @longjmp@
179 * Use: Handles other signals. Causes the daemon to die.
182 static void daemon__die(int sig)
184 daemon__signum = sig;
185 longjmp(daemon__dieBuf, 1);
188 /* --- @daemon__read@ --- *
190 * Arguments: @int fd@ = socket handle
194 * Use: Examines a buffer, and returns a response.
197 void daemon__read(int fd)
199 unsigned char buff[65536]; /* Buffer for incoming packets */
200 unsigned char rpl[crp_size]; /* Buffer for outgoing replies */
201 struct sockaddr_in sin; /* Address of packet sender */
202 char sender[64]; /* Sender's hostname (resolved) */
203 unsigned char sk[IDEA_KEYSIZE]; /* Session key for reply */
204 request rq; /* Request buffer for verification */
206 /* --- Read the message --- */
209 int slen = sizeof(sin);
211 if (recvfrom(fd, (char *)buff, sizeof(buff), 0,
212 (struct sockaddr *)&sin, &slen) < 0) {
213 syslog(LOG_INFO, "duff packet received: %e");
218 /* --- Resolve the host name --- */
221 struct hostent *he = gethostbyaddr((char *)&sin.sin_addr,
222 sizeof(sin.sin_addr),
226 he ? he->h_name : inet_ntoa(sin.sin_addr),
228 syslog(LOG_DEBUG, "packet received from %s", sender);
231 /* --- Unpack the block --- */
233 if (crypt_unpackRequest(&rq, buff, daemon__key, sk, rpl) == 0) {
235 syslog(LOG_INFO, "packet from %s rejected", sender);
240 /* --- Fill in the sender's address in the request block --- */
242 rq.host = sin.sin_addr;
244 /* --- Build a reply block --- */
247 int answer = rule_check(&rq);
248 syslog(LOG_INFO, "request from %s for %i to become %i to run %s %s",
249 sender, rq.from, rq.to, rq.cmd, answer ? "granted" : "denied");
250 crypt_packReply(rpl, sk, answer);
254 /* --- Send the reply off --- */
256 sendto(fd, (char *)rpl, crp_size, 0, (struct sockaddr *)&sin, sizeof(sin));
260 /* --- @daemon_init@ --- *
262 * Arguments: @const char *cf@ = pointer to name of configuration file
263 * @int port@ = port to listen to, or %$-1$% for default
267 * Use: Starts `become' up in daemon mode.
270 void daemon_init(const char *cf, int port)
274 /* --- Remove my root privileges --- *
276 * Just in case there's anything dodgy in my configuration file, or the
277 * user wants me to start on a funny port.
282 /* --- Initialise bits of the program --- */
291 openlog(quis(), 0, LOG_DAEMON);
292 syslog(LOG_NOTICE, "starting up");
294 if (daemon__readConfig(cf))
295 die("couldn't read configuration file");
297 /* --- Decide on a port to use --- *
299 * If I don't have a port yet (e.g., from the configuration file) then
300 * look it up in /etc/services under whatever name I was started as.
303 if (daemon__port <= 0) {
304 struct servent *se = getservbyname(quis(), "udp");
306 die("no idea which port to use");
307 daemon__port = ntohs(se->s_port);
310 /* --- Now set up a socket --- */
313 struct sockaddr_in sin;
315 if ((s = socket(PF_INET, SOCK_DGRAM, 0)) == -1)
316 die("couldn't create socket: %s", strerror(errno));
317 sin.sin_family = AF_INET;
318 sin.sin_port = htons(daemon__port);
319 sin.sin_addr.s_addr = htonl(INADDR_ANY);
320 if (bind(s, (struct sockaddr *)&sin, sizeof(sin)))
321 die("couldn't bind socket to port: %s", strerror(errno));
324 /* --- Fork off into the sunset --- */
331 /* --- Make a background process --- */
334 die("couldn't fork daemon: %s", strerror(errno));
338 /* --- Disconnect from the terminal --- */
342 /* --- Write my process id to a file --- */
344 if ((fp = fopen(file_PID, "w")) != 0) {
345 fprintf(fp, "%lu\n", (unsigned long)getpid());
351 /* --- Program in daemon death mode --- */
353 if (setjmp(daemon__dieBuf)) {
354 syslog(LOG_NOTICE, "killed by signal type %i", daemon__signum);
359 /* --- Set signal handlers --- */
361 signal(SIGHUP, daemon__restart);
362 signal(SIGQUIT, daemon__restart);
363 signal(SIGINT, daemon__die);
364 signal(SIGTERM, daemon__die);
365 signal(SIGSEGV, daemon__die);
366 signal(SIGFPE, daemon__die);
367 signal(SIGBUS, daemon__die);
369 /* --- Now wait for something exciting to happen --- *
371 * Actually, every so often (5 minutes, perhaps) I need to wake up and
372 * rescan the users to see whether they've changed. Time to play with
379 /* --- Find when I am, and thus when I need to be awoken again --- */
381 when = time(0) + daemon__awakeEvery;
387 /* --- Set up the file descriptor tables --- */
392 /* --- Now wait for something interesting --- */
394 i = select(FD_SETSIZE, &fds, 0, 0, 0);
396 /* --- Now, see if I need to rescan the config --- */
398 if (daemon__rescan || time(0) - when > 0) {
400 syslog(LOG_INFO, "rescanning configuration file");
406 if (daemon__readConfig(cf))
407 syslog(LOG_ERR, "error reading configuration file");
408 when = time(0) + daemon__awakeEvery;
411 /* --- Read the data from the request --- */
419 /*----- That's all, folks -------------------------------------------------*/