tinc/src/conf.c

473 lines
11 KiB
C
Raw Normal View History

2000-03-26 00:33:07 +00:00
/*
conf.c -- configuration code
Copyright (C) 1998 Robert van der Meulen
Copyright (C) 1998,1999,2000 Ivo Timmermans <itimmermans@bigfoot.com>
2000 Guus Sliepen <guus@sliepen.warande.net>
2000 Cris van Pelt <tribbel@arise.dhs.org>
2000-03-26 00:33:07 +00:00
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
2000-11-30 21:11:03 +00:00
$Id: conf.c,v 1.9.4.28 2000/11/30 21:11:03 zarq Exp $
2000-03-26 00:33:07 +00:00
*/
#include "config.h"
#include <assert.h>
2000-03-26 00:33:07 +00:00
#include <ctype.h>
#include <errno.h>
#include <netdb.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <syslog.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
2000-03-26 00:33:07 +00:00
#include <xalloc.h>
#include <utils.h> /* for cp */
2000-03-26 00:33:07 +00:00
#include "conf.h"
#include "netutl.h" /* for strtoip */
2000-05-29 21:01:26 +00:00
#include "system.h"
config_t *config = NULL;
2000-03-26 00:33:07 +00:00
int debug_lvl = 0;
int timeout = 0; /* seconds before timeout */
char *confbase = NULL; /* directory in which all config files are */
char *netname = NULL; /* name of the vpn network */
/* Will be set if HUP signal is received. It will be processed when it is safe. */
int sighup = 0;
2000-03-26 00:33:07 +00:00
/*
These are all the possible configurable values
*/
static internal_config_t hazahaza[] = {
/* Main configuration file keywords */
{ "Name", config_name, TYPE_NAME },
{ "ConnectTo", config_connectto, TYPE_NAME },
{ "PingTimeout", config_pingtimeout, TYPE_INT },
{ "TapDevice", config_tapdevice, TYPE_NAME },
{ "PrivateKey", config_privatekey, TYPE_NAME },
{ "KeyExpire", config_keyexpire, TYPE_INT },
{ "Hostnames", config_hostnames, TYPE_BOOL },
{ "Interface", config_interface, TYPE_NAME },
{ "InterfaceIP", config_interfaceip, TYPE_IP },
/* Host configuration file keywords */
{ "Address", config_address, TYPE_NAME },
{ "Port", config_port, TYPE_INT },
{ "PublicKey", config_publickey, TYPE_NAME },
{ "Subnet", config_subnet, TYPE_IP }, /* Use IPv4 subnets only for now */
{ "RestrictHosts", config_restricthosts, TYPE_BOOL },
{ "RestrictSubnets", config_restrictsubnets, TYPE_BOOL },
{ "RestrictAddress", config_restrictaddress, TYPE_BOOL },
{ "RestrictPort", config_restrictport, TYPE_BOOL },
{ "IndirectData", config_indirectdata, TYPE_BOOL },
{ "TCPonly", config_tcponly, TYPE_BOOL },
2000-03-26 00:33:07 +00:00
{ NULL, 0, 0 }
};
/*
Add given value to the list of configs cfg
*/
config_t *
add_config_val(config_t **cfg, int argtype, char *val)
{
2000-10-29 00:02:20 +00:00
config_t *p;
2000-03-26 00:33:07 +00:00
char *q;
cp
p = (config_t*)xmalloc(sizeof(*p));
2000-03-26 00:33:07 +00:00
p->data.val = 0;
2000-03-26 00:33:07 +00:00
switch(argtype)
{
case TYPE_INT:
p->data.val = strtol(val, &q, 0);
if(q && *q)
p->data.val = 0;
break;
case TYPE_NAME:
p->data.ptr = xmalloc(strlen(val) + 1);
strcpy(p->data.ptr, val);
break;
case TYPE_IP:
p->data.ip = strtoip(val);
break;
case TYPE_BOOL:
if(!strcasecmp("yes", val))
p->data.val = stupid_true;
else if(!strcasecmp("no", val))
p->data.val = stupid_false;
else
p->data.val = 0;
}
p->argtype = argtype;
2000-03-26 00:33:07 +00:00
if(p->data.val)
{
p->next = *cfg;
*cfg = p;
cp
2000-03-26 00:33:07 +00:00
return p;
}
else
{
free(p);
cp
return NULL;
}
2000-03-26 00:33:07 +00:00
}
/*
Read exactly one line and strip the trailing newline if any. If the
file was on EOF, return NULL. Otherwise, return all the data in a
dynamically allocated buffer.
*/
char *readline(FILE *fp)
{
char *newline = NULL;
char *p;
char *line; /* The array that contains everything that has been read
so far */
char *idx; /* Read into this pointer, which points to an offset
within line */
size_t size, newsize; /* The size of the current array pointed to by
line */
size_t maxlen; /* Maximum number of characters that may be read with
fgets. This is newsize - oldsize. */
if(feof(fp))
return NULL;
size = 100;
maxlen = size;
line = xmalloc(size);
idx = line;
for(;;)
{
errno = 0;
p = fgets(idx, maxlen, fp);
if(p == NULL) /* EOF or error */
{
if(feof(fp))
break;
/* otherwise: error; let the calling function print an error
message if applicable */
free(line);
return NULL;
}
newline = strchr(p, '\n');
if(newline == NULL)
/* We haven't yet read everything to the end of the line */
{
newsize = size << 1;
line = xrealloc(line, newsize);
idx = &line[size - 1];
maxlen = newsize - size + 1;
size = newsize;
}
else
{
*newline = '\0'; /* kill newline */
break; /* yay */
}
}
return line;
}
2000-03-26 00:33:07 +00:00
/*
Parse a configuration file and put the results in the configuration tree
starting at *base.
2000-03-26 00:33:07 +00:00
*/
int read_config_file(config_t **base, const char *fname)
2000-03-26 00:33:07 +00:00
{
int err = -1;
FILE *fp;
char *line;
2000-03-26 00:33:07 +00:00
char *p, *q;
int i, lineno = 0;
2000-03-26 00:33:07 +00:00
config_t *cfg;
cp
if((fp = fopen (fname, "r")) == NULL)
return -1;
2000-03-26 00:33:07 +00:00
for(;;)
{
if((line = readline(fp)) == NULL)
{
err = -1;
break;
}
lineno++;
if((p = strtok(line, "\t =")) == NULL)
2000-03-26 00:33:07 +00:00
continue; /* no tokens on this line */
if(p[0] == '#')
continue; /* comment: ignore */
for(i = 0; hazahaza[i].name != NULL; i++)
if(!strcasecmp(hazahaza[i].name, p))
break;
if(!hazahaza[i].name)
{
syslog(LOG_ERR, _("Invalid variable name on line %d while reading config file %s"),
lineno, fname);
break;
2000-03-26 00:33:07 +00:00
}
if(((q = strtok(NULL, "\t\n\r =")) == NULL) || q[0] == '#')
{
fprintf(stderr, _("No value for variable on line %d while reading config file %s"),
lineno, fname);
break;
2000-03-26 00:33:07 +00:00
}
cfg = add_config_val(base, hazahaza[i].argtype, q);
2000-03-26 00:33:07 +00:00
if(cfg == NULL)
{
fprintf(stderr, _("Invalid value for variable on line %d while reading config file %s"),
lineno, fname);
break;
2000-03-26 00:33:07 +00:00
}
cfg->which = hazahaza[i].which;
if(!config)
config = cfg;
free(line);
2000-03-26 00:33:07 +00:00
}
free(line);
2000-03-26 00:33:07 +00:00
fclose (fp);
cp
return err;
2000-03-26 00:33:07 +00:00
}
int read_server_config()
{
char *fname;
int x;
cp
asprintf(&fname, "%s/tinc.conf", confbase);
x = read_config_file(&config, fname);
if(x != 0)
{
fprintf(stderr, _("Failed to read `%s': %m\n"),
fname);
}
free(fname);
cp
return x;
}
2000-03-26 00:33:07 +00:00
/*
Look up the value of the config option type
*/
const config_t *get_config_val(config_t *p, which_t type)
2000-03-26 00:33:07 +00:00
{
cp
for(; p != NULL; p = p->next)
2000-03-26 00:33:07 +00:00
if(p->which == type)
break;
cp
return p;
2000-03-26 00:33:07 +00:00
}
/*
Remove the complete configuration tree.
*/
void clear_config(config_t **base)
{
config_t *p, *next;
cp
for(p = *base; p != NULL; p = next)
{
next = p->next;
if(p->data.ptr && (p->argtype == TYPE_NAME))
{
free(p->data.ptr);
}
free(p);
}
*base = NULL;
cp
}
int isadir(const char* f)
{
struct stat s;
if(stat(f, &s) < 0)
{
fprintf(stderr, _("Couldn't stat `%s': %m\n"),
f);
return -1;
}
return S_ISDIR(s.st_mode);
}
int is_safe_path(const char *file)
{
char *p;
char *fn = xstrdup(file);
struct stat s;
p = strrchr(file, '/');
assert(p); /* p has to contain a / */
*p = '\0';
if(stat(file, &s) < 0)
{
fprintf(stderr, _("Couldn't stat `%s': %m\n"),
file);
return 0;
}
if(s.st_uid != geteuid())
{
fprintf(stderr, _("`%s' is owned by UID %d instead of %d.\n"),
file, s.st_uid, geteuid());
return 0;
}
if(S_ISLNK(s.st_mode))
{
fprintf(stderr, _("Warning: `%s' is a symlink\n"),
file);
/* fixme: read the symlink and start again */
}
*p = '/';
2000-11-30 21:11:03 +00:00
if(stat(file, &s) < 0 && errno != ENOENT)
{
fprintf(stderr, _("Couldn't stat `%s': %m\n"),
file);
return 0;
}
2000-11-30 21:11:03 +00:00
if(errno == ENOENT)
return 1;
if(s.st_uid != geteuid())
{
fprintf(stderr, _("`%s' is owned by UID %d instead of %d.\n"),
file, s.st_uid, geteuid());
return 0;
}
if(S_ISLNK(s.st_mode))
{
fprintf(stderr, _("Warning: `%s' is a symlink\n"),
file);
/* fixme: read the symlink and start again */
}
if(s.st_mode & 0007)
{
/* Accessible by others */
fprintf(stderr, _("`%s' has unsecure permissions.\n"),
file);
return 0;
}
return 1;
}
FILE *ask_and_safe_open(const char* filename, const char* what)
{
FILE *r;
char *directory;
char *fn;
int len;
/* Check stdin and stdout */
if(!isatty(0) || !isatty(1))
{
/* Argh, they are running us from a script or something. Write
the files to the current directory and let them burn in hell
for ever. */
fn = xstrdup(filename);
}
else
{
/* Ask for a file and/or directory name. */
fprintf(stdout, _("Please enter a file to save %s to [%s]: "),
what, filename);
fflush(stdout); /* Don't wait for a newline */
if((fn = readline(stdin)) == NULL)
{
fprintf(stderr, _("Error while reading stdin: %m\n"));
return NULL;
}
if(strlen(fn) == 0)
/* User just pressed enter. */
fn = xstrdup(filename);
}
if((strchr(fn, '/') == NULL) || (fn[0] != '/'))
{
/* The directory is a relative path or a filename. */
char *p;
directory = get_current_dir_name();
len = strlen(fn) + strlen(directory) + 2; /* 1 for the / */
p = xmalloc(len);
snprintf(p, len, "%s/%s", directory, fn);
free(fn);
free(directory);
fn = p;
}
if(isadir(fn) > 0) /* -1 is error */
{
char *p;
len = strlen(fn) + strlen(filename) + 2; /* 1 for the / */
p = xmalloc(len);
snprintf(p, len, "%s/%s", fn, filename);
free(fn);
fn = p;
}
umask(0077); /* Disallow everything for group and other */
/* Open it first to keep the inode busy */
if((r = fopen(fn, "w")) == NULL)
{
fprintf(stderr, _("Error opening file `%s': %m\n"),
fn);
free(fn);
return NULL;
}
/* Then check the file for nasty attacks */
if(!is_safe_path(fn)) /* Do not permit any directories that are
readable or writeable by other users. */
{
fprintf(stderr, _("The file `%s' (or any of the leading directories) has unsafe permissions.\n"
"I will not create or overwrite this file.\n"),
fn);
fclose(r);
free(fn);
return NULL;
}
free(fn);
return r;
}