tinc/src/conf.c

619 lines
12 KiB
C
Raw Normal View History

2000-03-26 00:33:07 +00:00
/*
conf.c -- configuration code
Copyright (C) 1998 Robert van der Meulen
1998-2002 Ivo Timmermans <ivo@o2w.nl>
2000-2002 Guus Sliepen <guus@sliepen.eu.org>
2000 Cris van Pelt <tribbel@arise.dhs.org>
2000-03-26 00:33:07 +00:00
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
2002-09-09 22:33:31 +00:00
$Id: conf.c,v 1.9.4.60 2002/09/09 22:32:30 guus Exp $
2000-03-26 00:33:07 +00:00
*/
#include "config.h"
2000-03-26 00:33:07 +00:00
#include <ctype.h>
#include <errno.h>
#include <netdb.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <syslog.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#include <syslog.h>
2001-07-24 20:03:40 +00:00
#include <string.h>
2000-03-26 00:33:07 +00:00
#include <xalloc.h>
2002-09-09 21:25:28 +00:00
#include <utils.h> /* for cp */
#include <avl_tree.h>
2000-03-26 00:33:07 +00:00
#include "conf.h"
2002-09-09 21:25:28 +00:00
#include "netutl.h" /* for str2address */
2000-03-26 00:33:07 +00:00
2000-05-29 21:01:26 +00:00
#include "system.h"
avl_tree_t *config_tree;
2000-03-26 00:33:07 +00:00
int debug_lvl = 0;
2002-09-09 21:25:28 +00:00
int pingtimeout = 0; /* seconds before timeout */
char *confbase = NULL; /* directory in which all config files are */
char *netname = NULL; /* name of the vpn network */
2002-09-09 22:33:31 +00:00
int config_compare(config_t *a, config_t *b)
{
2002-09-09 21:25:28 +00:00
int result;
2002-09-09 21:25:28 +00:00
result = strcasecmp(a->variable, b->variable);
2002-09-09 21:25:28 +00:00
if(result)
return result;
2000-03-26 00:33:07 +00:00
2002-09-09 21:25:28 +00:00
result = a->line - b->line;
2002-09-09 21:25:28 +00:00
if(result)
return result;
else
return strcmp(a->file, b->file);
}
2002-09-09 21:25:28 +00:00
void init_configuration(avl_tree_t ** config_tree)
2000-03-26 00:33:07 +00:00
{
2002-09-09 21:25:28 +00:00
cp();
*config_tree = avl_alloc_tree((avl_compare_t) config_compare, (avl_action_t) free_config);
}
2002-09-09 21:25:28 +00:00
void exit_configuration(avl_tree_t ** config_tree)
{
2002-09-09 21:25:28 +00:00
cp();
avl_delete_tree(*config_tree);
*config_tree = NULL;
}
config_t *new_config(void)
{
2002-09-09 21:25:28 +00:00
cp();
2002-09-09 21:25:28 +00:00
return (config_t *) xmalloc_and_zero(sizeof(config_t));
}
2000-03-26 00:33:07 +00:00
2002-09-09 22:33:31 +00:00
void free_config(config_t *cfg)
{
2002-09-09 21:25:28 +00:00
cp();
if(cfg->variable)
free(cfg->variable);
if(cfg->value)
free(cfg->value);
if(cfg->file)
free(cfg->file);
free(cfg);
}
2002-09-09 22:33:31 +00:00
void config_add(avl_tree_t *config_tree, config_t *cfg)
{
2002-09-09 21:25:28 +00:00
cp();
avl_insert(config_tree, cfg);
}
2002-09-09 22:33:31 +00:00
config_t *lookup_config(avl_tree_t *config_tree, char *variable)
{
2002-09-09 21:25:28 +00:00
config_t cfg, *found;
cp();
cfg.variable = variable;
cfg.file = "";
cfg.line = 0;
2002-09-09 21:25:28 +00:00
found = avl_search_closest_greater(config_tree, &cfg);
2002-09-09 21:25:28 +00:00
if(!found)
return NULL;
2002-09-09 21:25:28 +00:00
if(strcasecmp(found->variable, variable))
return NULL;
2002-09-09 21:25:28 +00:00
return found;
}
2002-09-09 22:33:31 +00:00
config_t *lookup_config_next(avl_tree_t *config_tree, config_t *cfg)
{
2002-09-09 21:25:28 +00:00
avl_node_t *node;
config_t *found;
cp();
node = avl_search_node(config_tree, cfg);
if(node) {
if(node->next) {
found = (config_t *) node->next->data;
if(!strcasecmp(found->variable, cfg->variable))
return found;
}
}
return NULL;
}
2002-09-09 22:33:31 +00:00
int get_config_bool(config_t *cfg, int *result)
{
2002-09-09 21:25:28 +00:00
cp();
if(!cfg)
return 0;
if(!strcasecmp(cfg->value, "yes")) {
*result = 1;
return 1;
} else if(!strcasecmp(cfg->value, "no")) {
*result = 0;
return 1;
}
syslog(LOG_ERR, _("\"yes\" or \"no\" expected for configuration variable %s in %s line %d"),
cfg->variable, cfg->file, cfg->line);
return 0;
}
2002-09-09 22:33:31 +00:00
int get_config_int(config_t *cfg, int *result)
{
2002-09-09 21:25:28 +00:00
cp();
if(!cfg)
return 0;
2002-09-09 21:25:28 +00:00
if(sscanf(cfg->value, "%d", result) == 1)
return 1;
2002-09-09 21:25:28 +00:00
syslog(LOG_ERR, _("Integer expected for configuration variable %s in %s line %d"),
cfg->variable, cfg->file, cfg->line);
return 0;
}
2002-09-09 22:33:31 +00:00
int get_config_string(config_t *cfg, char **result)
{
2002-09-09 21:25:28 +00:00
cp();
if(!cfg)
return 0;
2002-09-09 21:25:28 +00:00
*result = xstrdup(cfg->value);
return 1;
}
2002-09-09 22:33:31 +00:00
int get_config_address(config_t *cfg, struct addrinfo **result)
2002-02-10 21:57:54 +00:00
{
2002-09-09 21:25:28 +00:00
struct addrinfo *ai;
cp();
if(!cfg)
return 0;
ai = str2addrinfo(cfg->value, NULL, 0);
if(ai) {
*result = ai;
return 1;
}
syslog(LOG_ERR, _("Hostname or IP address expected for configuration variable %s in %s line %d"),
cfg->variable, cfg->file, cfg->line);
return 0;
2002-02-10 21:57:54 +00:00
}
2002-09-09 22:33:31 +00:00
int get_config_port(config_t *cfg, port_t *result)
2002-02-10 21:57:54 +00:00
{
2002-09-09 21:25:28 +00:00
cp();
if(!cfg)
return 0;
if(sscanf(cfg->value, "%hu", result) == 1) {
*result = htons(*result);
return 1;
}
syslog(LOG_ERR, _("Port number expected for configuration variable %s in %s line %d"),
cfg->variable, cfg->file, cfg->line);
return 0;
2002-02-10 21:57:54 +00:00
}
2002-09-09 22:33:31 +00:00
int get_config_subnet(config_t *cfg, subnet_t ** result)
{
2002-09-09 21:25:28 +00:00
subnet_t *subnet;
cp();
if(!cfg)
return 0;
subnet = str2net(cfg->value);
if(!subnet) {
syslog(LOG_ERR, _("Subnet expected for configuration variable %s in %s line %d"),
cfg->variable, cfg->file, cfg->line);
return 0;
}
/* Teach newbies what subnets are... */
if(((subnet->type == SUBNET_IPV4)
&& maskcheck(&subnet->net.ipv4.address, subnet->net.ipv4.prefixlength, sizeof(ipv4_t)))
|| ((subnet->type == SUBNET_IPV6)
&& maskcheck(&subnet->net.ipv6.address, subnet->net.ipv6.prefixlength, sizeof(ipv6_t)))) {
syslog(LOG_ERR, _ ("Network address and prefix length do not match for configuration variable %s in %s line %d"),
cfg->variable, cfg->file, cfg->line);
free(subnet);
return 0;
}
*result = subnet;
return 1;
}
/*
Read exactly one line and strip the trailing newline if any. If the
file was on EOF, return NULL. Otherwise, return all the data in a
dynamically allocated buffer.
If line is non-NULL, it will be used as an initial buffer, to avoid
unnecessary mallocing each time this function is called. If buf is
given, and buf needs to be expanded, the var pointed to by buflen
will be increased.
*/
2002-09-09 22:33:31 +00:00
char *readline(FILE * fp, char **buf, size_t *buflen)
{
2002-09-09 21:25:28 +00:00
char *newline = NULL;
char *p;
char *line; /* The array that contains everything that has been read so far */
char *idx; /* Read into this pointer, which points to an offset within line */
size_t size, newsize; /* The size of the current array pointed to by line */
size_t maxlen; /* Maximum number of characters that may be read with fgets. This is newsize - oldsize. */
if(feof(fp))
return NULL;
if(buf && buflen) {
size = *buflen;
line = *buf;
} else {
size = 100;
line = xmalloc(size);
}
2002-09-09 21:25:28 +00:00
maxlen = size;
idx = line;
*idx = 0;
for(;;) {
errno = 0;
p = fgets(idx, maxlen, fp);
if(!p) { /* EOF or error */
if(feof(fp))
break;
/* otherwise: error; let the calling function print an error message if applicable */
free(line);
return NULL;
}
newline = strchr(p, '\n');
if(!newline) { /* We haven't yet read everything to the end of the line */
newsize = size << 1;
line = xrealloc(line, newsize);
idx = &line[size - 1];
maxlen = newsize - size + 1;
size = newsize;
} else {
*newline = '\0'; /* kill newline */
break; /* yay */
}
}
2002-09-09 21:25:28 +00:00
if(buf && buflen) {
*buflen = size;
*buf = line;
}
2002-09-09 21:25:28 +00:00
return line;
}
2000-03-26 00:33:07 +00:00
/*
Parse a configuration file and put the results in the configuration tree
starting at *base.
2000-03-26 00:33:07 +00:00
*/
2002-09-09 22:33:31 +00:00
int read_config_file(avl_tree_t *config_tree, const char *fname)
2000-03-26 00:33:07 +00:00
{
2002-09-09 21:25:28 +00:00
int err = -2; /* Parse error */
FILE *fp;
char *buffer, *line;
char *variable, *value;
int lineno = 0, ignore = 0;
config_t *cfg;
size_t bufsize;
cp();
fp = fopen(fname, "r");
if(!fp) {
syslog(LOG_ERR, _("Cannot open config file %s: %s"), fname,
strerror(errno));
return -3;
}
2002-09-09 21:25:28 +00:00
bufsize = 100;
buffer = xmalloc(bufsize);
for(;;) {
line = readline(fp, &buffer, &bufsize);
if(!line) {
err = -1;
break;
}
if(feof(fp)) {
err = 0;
break;
}
2002-09-09 21:25:28 +00:00
lineno++;
2002-09-09 21:25:28 +00:00
variable = strtok(line, "\t =");
2000-03-26 00:33:07 +00:00
2002-09-09 21:25:28 +00:00
if(!variable)
continue; /* no tokens on this line */
2000-03-26 00:33:07 +00:00
2002-09-09 21:25:28 +00:00
if(variable[0] == '#')
continue; /* comment: ignore */
2002-09-09 21:25:28 +00:00
if(!strcmp(variable, "-----BEGIN"))
ignore = 1;
2002-09-09 21:25:28 +00:00
if(!ignore) {
value = strtok(NULL, "\t\n\r =");
2002-09-09 21:25:28 +00:00
if(!value || value[0] == '#') {
syslog(LOG_ERR, _("No value for variable `%s' on line %d while reading config file %s"),
variable, lineno, fname);
break;
}
2002-09-09 21:25:28 +00:00
cfg = new_config();
cfg->variable = xstrdup(variable);
cfg->value = xstrdup(value);
cfg->file = xstrdup(fname);
cfg->line = lineno;
2002-09-09 21:25:28 +00:00
config_add(config_tree, cfg);
}
2000-03-26 00:33:07 +00:00
2002-09-09 21:25:28 +00:00
if(!strcmp(variable, "-----END"))
ignore = 0;
}
free(buffer);
fclose(fp);
return err;
2000-03-26 00:33:07 +00:00
}
int read_server_config()
{
2002-09-09 21:25:28 +00:00
char *fname;
int x;
cp();
asprintf(&fname, "%s/tinc.conf", confbase);
x = read_config_file(config_tree, fname);
if(x == -1) { /* System error: complain */
syslog(LOG_ERR, _("Failed to read `%s': %s"), fname, strerror(errno));
}
free(fname);
return x;
}
2002-09-09 21:25:28 +00:00
int isadir(const char *f)
{
2002-09-09 21:25:28 +00:00
struct stat s;
2002-09-09 21:25:28 +00:00
if(stat(f, &s) < 0)
return 0;
else
return S_ISDIR(s.st_mode);
}
int is_safe_path(const char *file)
{
2002-09-09 21:25:28 +00:00
char *p;
const char *f;
char x;
struct stat s;
char l[MAXBUFSIZE];
if(*file != '/') {
syslog(LOG_ERR, _("`%s' is not an absolute path"), file);
return 0;
}
2002-09-09 21:25:28 +00:00
p = strrchr(file, '/');
2002-09-09 21:25:28 +00:00
if(p == file) /* It's in the root */
p++;
2002-09-09 21:25:28 +00:00
x = *p;
*p = '\0';
2002-09-09 21:25:28 +00:00
f = file;
check1:
2002-09-09 21:25:28 +00:00
if(lstat(f, &s) < 0) {
syslog(LOG_ERR, _("Couldn't stat `%s': %s"), f, strerror(errno));
return 0;
}
if(s.st_uid != geteuid()) {
syslog(LOG_ERR, _("`%s' is owned by UID %d instead of %d"),
f, s.st_uid, geteuid());
return 0;
}
if(S_ISLNK(s.st_mode)) {
syslog(LOG_WARNING, _("Warning: `%s' is a symlink"), f);
if(readlink(f, l, MAXBUFSIZE) < 0) {
syslog(LOG_ERR, _("Unable to read symbolic link `%s': %s"), f,
strerror(errno));
return 0;
}
f = l;
goto check1;
}
*p = x;
f = file;
check2:
2002-09-09 21:25:28 +00:00
if(lstat(f, &s) < 0 && errno != ENOENT) {
syslog(LOG_ERR, _("Couldn't stat `%s': %s"), f, strerror(errno));
return 0;
}
if(errno == ENOENT)
return 1;
if(s.st_uid != geteuid()) {
syslog(LOG_ERR, _("`%s' is owned by UID %d instead of %d"),
f, s.st_uid, geteuid());
return 0;
}
if(S_ISLNK(s.st_mode)) {
syslog(LOG_WARNING, _("Warning: `%s' is a symlink"), f);
if(readlink(f, l, MAXBUFSIZE) < 0) {
syslog(LOG_ERR, _("Unable to read symbolic link `%s': %s"), f,
strerror(errno));
return 0;
}
f = l;
goto check2;
}
if(s.st_mode & 0007) {
/* Accessible by others */
syslog(LOG_ERR, _("`%s' has unsecure permissions"), f);
return 0;
}
return 1;
}
2002-09-09 21:25:28 +00:00
FILE *ask_and_safe_open(const char *filename, const char *what,
const char *mode)
{
2002-09-09 21:25:28 +00:00
FILE *r;
char *directory;
char *fn;
/* Check stdin and stdout */
if(!isatty(0) || !isatty(1)) {
/* Argh, they are running us from a script or something. Write
the files to the current directory and let them burn in hell
for ever. */
fn = xstrdup(filename);
} else {
/* Ask for a file and/or directory name. */
fprintf(stdout, _("Please enter a file to save %s to [%s]: "),
what, filename);
fflush(stdout);
fn = readline(stdin, NULL, NULL);
if(!fn) {
fprintf(stderr, _("Error while reading stdin: %s\n"),
strerror(errno));
return NULL;
}
if(!strlen(fn))
/* User just pressed enter. */
fn = xstrdup(filename);
}
2002-09-09 21:25:28 +00:00
if(!strchr(fn, '/') || fn[0] != '/') {
/* The directory is a relative path or a filename. */
char *p;
directory = get_current_dir_name();
asprintf(&p, "%s/%s", directory, fn);
free(fn);
free(directory);
fn = p;
}
umask(0077); /* Disallow everything for group and other */
/* Open it first to keep the inode busy */
r = fopen(fn, mode);
if(!r) {
fprintf(stderr, _("Error opening file `%s': %s\n"),
fn, strerror(errno));
free(fn);
return NULL;
}
/* Then check the file for nasty attacks */
if(!is_safe_path(fn)) { /* Do not permit any directories that are readable or writeable by other users. */
fprintf(stderr, _("The file `%s' (or any of the leading directories) has unsafe permissions.\n"
"I will not create or overwrite this file.\n"), fn);
fclose(r);
free(fn);
return NULL;
}
free(fn);
return r;
}