/* tincd.c -- the main file for tincd Copyright (C) 1998-2001 Ivo Timmermans 2000,2001 Guus Sliepen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. $Id: tincd.c,v 1.10.4.47 2001/06/05 16:09:55 guus Exp $ */ #include "config.h" #include #include #include #include #include #include #include #include #include #include #include #ifdef HAVE_SYS_IOCTL_H # include #endif #ifdef HAVE_OPENSSL_RAND_H # include #else # include #endif #ifdef HAVE_OPENSSL_RSA_H # include #else # include #endif #ifdef HAVE_OPENSSL_ERR_H # include #else # include #endif #ifdef HAVE_OPENSSL_PEM_H # include #else # include #endif #include #include #include "conf.h" #include "net.h" #include "netutl.h" #include "process.h" #include "protocol.h" #include "subnet.h" #include "system.h" /* The name this program was run with. */ char *program_name; /* If nonzero, display usage information and exit. */ static int show_help; /* If nonzero, print the version on standard output and exit. */ static int show_version; /* If nonzero, it will attempt to kill a running tincd and exit. */ static int kill_tincd = 0; /* If nonzero, generate public/private keypair for this host/net. */ static int generate_keys = 0; char *identname; /* program name for syslog */ char *pidfilename; /* pid file location */ char **g_argv; /* a copy of the cmdline arguments */ char **environment; /* A pointer to the environment on startup */ static struct option const long_options[] = { { "config", required_argument, NULL, 'c' }, { "kill", no_argument, NULL, 'k' }, { "net", required_argument, NULL, 'n' }, { "help", no_argument, &show_help, 1 }, { "version", no_argument, &show_version, 1 }, { "no-detach", no_argument, &do_detach, 0 }, { "generate-keys", optional_argument, NULL, 'K'}, { NULL, 0, NULL, 0 } }; static void usage(int status) { if(status != 0) fprintf(stderr, _("Try `%s --help\' for more information.\n"), program_name); else { printf(_("Usage: %s [option]...\n\n"), program_name); printf(_(" -c, --config=DIR Read configuration options from DIR.\n" " -D, --no-detach Don't fork and detach.\n" " -d Increase debug level.\n" " -k, --kill Attempt to kill a running tincd and exit.\n" " -n, --net=NETNAME Connect to net NETNAME.\n")); printf(_(" -K, --generate-keys[=BITS] Generate public/private RSA keypair.\n" " --help Display this help and exit.\n" " --version Output version information and exit.\n\n")); printf(_("Report bugs to tinc@nl.linux.org.\n")); } exit(status); } void parse_options(int argc, char **argv, char **envp) { int r; int option_index = 0; while((r = getopt_long(argc, argv, "c:Ddkn:K::", long_options, &option_index)) != EOF) { switch(r) { case 0: /* long option */ break; case 'c': /* config file */ confbase = xmalloc(strlen(optarg)+1); strcpy(confbase, optarg); break; case 'D': /* no detach */ do_detach = 0; break; case 'd': /* inc debug level */ if(optarg) debug_lvl = atoi(optarg); else debug_lvl++; break; case 'k': /* kill old tincds */ kill_tincd = 1; break; case 'n': /* net name given */ netname = xmalloc(strlen(optarg)+1); strcpy(netname, optarg); break; case 'K': /* generate public/private keypair */ if(optarg) { generate_keys = atoi(optarg); if(generate_keys < 512) { fprintf(stderr, _("Invalid argument `%s'; BITS must be a number equal to or greater than 512.\n"), optarg); usage(1); } generate_keys &= ~7; /* Round it to bytes */ } else generate_keys = 1024; break; case '?': usage(1); default: break; } } } /* This function prettyprints the key generation process */ void indicator(int a, int b, void *p) { switch(a) { case 0: fprintf(stderr, "."); break; case 1: fprintf(stderr, "+"); break; case 2: fprintf(stderr, "-"); break; case 3: switch(b) { case 0: fprintf(stderr, " p\n"); break; case 1: fprintf(stderr, " q\n"); break; default: fprintf(stderr, "?"); } break; default: fprintf(stderr, "?"); } } /* Generate a public/private RSA keypair, and ask for a file to store them in. */ int keygen(int bits) { RSA *rsa_key; FILE *f; config_t const *cfg; char *filename; fprintf(stderr, _("Generating %d bits keys:\n"), bits); rsa_key = RSA_generate_key(bits, 0xFFFF, indicator, NULL); if(!rsa_key) { fprintf(stderr, _("Error during key generation!")); return -1; } else fprintf(stderr, _("Done.\n")); if(config && (cfg = get_config_val(config, config_name))) asprintf(&filename, "%s/hosts/%s", confbase, cfg->data.ptr); else asprintf(&filename, "%s/rsa_key.priv", confbase); if((f = ask_and_safe_open(filename, _("public RSA key"), "a")) == NULL) return -1; if(ftell(f)) fprintf(stderr, _("Appending key to existing contents.\nMake sure only one key is stored in the file.\n")); PEM_write_RSAPublicKey(f, rsa_key); fclose(f); free(filename); asprintf(&filename, "%s/rsa_key.priv", confbase); if((f = ask_and_safe_open(filename, _("private RSA key"), "a")) == NULL) return -1; if(ftell(f)) fprintf(stderr, _("Appending key to existing contents.\nMake sure only one key is stored in the file.\n")); PEM_write_RSAPrivateKey(f, rsa_key, NULL, NULL, 0, NULL, NULL); fclose(f); free(filename); return 0; } /* Set all files and paths according to netname */ void make_names(void) { if(netname) { if(!pidfilename) asprintf(&pidfilename, LOCALSTATEDIR "/run/tinc.%s.pid", netname); if(!confbase) asprintf(&confbase, "%s/tinc/%s", CONFDIR, netname); else syslog(LOG_INFO, _("Both netname and configuration directory given, using the latter...")); if(!identname) asprintf(&identname, "tinc.%s", netname); } else { if(!pidfilename) pidfilename = LOCALSTATEDIR "/run/tinc.pid"; if(!confbase) asprintf(&confbase, "%s/tinc", CONFDIR); if(!identname) identname = "tinc"; } } int main(int argc, char **argv, char **envp) { program_name = argv[0]; setlocale (LC_ALL, ""); bindtextdomain (PACKAGE, LOCALEDIR); textdomain (PACKAGE); environment = envp; parse_options(argc, argv, envp); if(show_version) { printf(_("%s version %s (built %s %s, protocol %d)\n"), PACKAGE, VERSION, __DATE__, __TIME__, PROT_CURRENT); printf(_("Copyright (C) 1998-2001 Ivo Timmermans, Guus Sliepen and others.\n" "See the AUTHORS file for a complete list.\n\n" "tinc comes with ABSOLUTELY NO WARRANTY. This is free software,\n" "and you are welcome to redistribute it under certain conditions;\n" "see the file COPYING for details.\n")); return 0; } if(show_help) usage(0); if(geteuid()) { fprintf(stderr, _("You must be root to run this program.\n")); return 1; } #ifdef HAVE_SOLARIS openlog("tinc", LOG_CONS, LOG_DAEMON); /* Catch all syslog() calls issued before detaching */ #else openlog("tinc", LOG_PERROR, LOG_DAEMON); /* Catch all syslog() calls issued before detaching */ #endif g_argv = argv; make_names(); /* Slllluuuuuuurrrrp! */ cp RAND_load_file("/dev/urandom", 1024); cp if(generate_keys) { read_server_config(); exit(keygen(generate_keys)); } if(kill_tincd) exit(kill_other()); if(read_server_config()) exit(1); cp if(detach()) exit(0); cp if(debug_lvl >= DEBUG_ERROR) ERR_load_crypto_strings(); for(;;) { if(!setup_network_connections()) { main_loop(); cleanup_and_exit(1); } syslog(LOG_ERR, _("Unrecoverable error")); cp_trace(); if(do_detach) { syslog(LOG_NOTICE, _("Restarting in %d seconds!"), MAXTIMEOUT); sleep(MAXTIMEOUT); } else { syslog(LOG_ERR, _("Not restarting.")); exit(1); } } }