fs.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595
  1. #include "dat.h"
  2. int askforkeys = 1;
  3. char *authaddr;
  4. int debug;
  5. int doprivate = 1;
  6. int gflag;
  7. char *owner;
  8. int kflag;
  9. char *mtpt = "/mnt";
  10. Keyring *ring;
  11. char *service;
  12. int sflag;
  13. int uflag;
  14. extern Srv fs;
  15. static void notifyf(void*, char*);
  16. static void private(void);
  17. char Easproto[] = "auth server protocol botch";
  18. char Ebadarg[] = "invalid argument";
  19. char Ebadkey[] = "bad key";
  20. char Enegotiation[] = "negotiation failed, no common protocols or keys";
  21. char Etoolarge[] = "rpc too large";
  22. Proto*
  23. prototab[] =
  24. {
  25. &apop,
  26. &chap,
  27. &cram,
  28. &httpdigest,
  29. &mschap,
  30. &p9any,
  31. &p9cr,
  32. &p9sk1,
  33. &p9sk2,
  34. &pass,
  35. /* &srs, */
  36. &rsa,
  37. &vnc,
  38. &wep,
  39. nil,
  40. };
  41. void
  42. usage(void)
  43. {
  44. fprint(2, "usage: %s [-DSdknpu] [-a authaddr] [-m mtpt] [-s service]\n",
  45. argv0);
  46. fprint(2, "or %s -g 'params'\n", argv0);
  47. exits("usage");
  48. }
  49. void
  50. main(int argc, char **argv)
  51. {
  52. int i, trysecstore;
  53. char err[ERRMAX], *s;
  54. Dir d;
  55. Proto *p;
  56. char *secstorepw;
  57. trysecstore = 1;
  58. secstorepw = nil;
  59. ARGBEGIN{
  60. case 'D':
  61. chatty9p++;
  62. break;
  63. case 'S': /* server: read nvram, no prompting for keys */
  64. askforkeys = 0;
  65. trysecstore = 0;
  66. sflag = 1;
  67. break;
  68. case 'a':
  69. authaddr = EARGF(usage());
  70. break;
  71. case 'd':
  72. debug = 1;
  73. doprivate = 0;
  74. break;
  75. case 'g': /* get: prompt for key for name and domain */
  76. gflag = 1;
  77. break;
  78. case 'k': /* reinitialize nvram */
  79. kflag = 1;
  80. break;
  81. case 'm': /* set default mount point */
  82. mtpt = EARGF(usage());
  83. break;
  84. case 'n':
  85. trysecstore = 0;
  86. break;
  87. case 'p':
  88. doprivate = 0;
  89. break;
  90. case 's': /* set service name */
  91. service = EARGF(usage());
  92. break;
  93. case 'u': /* user: set hostowner */
  94. uflag = 1;
  95. break;
  96. default:
  97. usage();
  98. }ARGEND
  99. if(argc != 0 && !gflag)
  100. usage();
  101. if(doprivate)
  102. private();
  103. initcap();
  104. quotefmtinstall();
  105. fmtinstall('A', _attrfmt);
  106. fmtinstall('N', attrnamefmt);
  107. fmtinstall('H', encodefmt);
  108. ring = emalloc(sizeof(*ring));
  109. notify(notifyf);
  110. if(gflag){
  111. if(argc != 1)
  112. usage();
  113. askuser(argv[0]);
  114. exits(nil);
  115. }
  116. for(i=0; prototab[i]; i++){
  117. p = prototab[i];
  118. if(p->name == nil)
  119. sysfatal("protocol %d has no name", i);
  120. if(p->init == nil)
  121. sysfatal("protocol %s has no init", p->name);
  122. if(p->write == nil)
  123. sysfatal("protocol %s has no write", p->name);
  124. if(p->read == nil)
  125. sysfatal("protocol %s has no read", p->name);
  126. if(p->close == nil)
  127. sysfatal("protocol %s has no close", p->name);
  128. if(p->keyprompt == nil)
  129. p->keyprompt = "";
  130. }
  131. if(sflag){
  132. s = getnvramkey(kflag ? NVwrite : NVwriteonerr, &secstorepw);
  133. if(s == nil)
  134. fprint(2, "factotum warning: cannot read nvram: %r\n");
  135. else if(ctlwrite(s, 0) < 0)
  136. fprint(2, "factotum warning: cannot add nvram key: %r\n");
  137. if(secstorepw != nil)
  138. trysecstore = 1;
  139. if (s != nil) {
  140. memset(s, 0, strlen(s));
  141. free(s);
  142. }
  143. } else if(uflag)
  144. promptforhostowner();
  145. owner = getuser();
  146. if(trysecstore){
  147. if(havesecstore() == 1){
  148. while(secstorefetch(secstorepw) < 0){
  149. rerrstr(err, sizeof err);
  150. if(strcmp(err, "cancel") == 0)
  151. break;
  152. fprint(2, "factotum: secstorefetch: %r\n");
  153. fprint(2, "Enter an empty password to quit.\n");
  154. free(secstorepw);
  155. secstorepw = nil; /* just try nvram pw once */
  156. }
  157. }else{
  158. /*
  159. rerrstr(err, sizeof err);
  160. if(*err)
  161. fprint(2, "factotum: havesecstore: %r\n");
  162. */
  163. }
  164. }
  165. postmountsrv(&fs, service, mtpt, MBEFORE);
  166. if(service){
  167. nulldir(&d);
  168. d.mode = 0666;
  169. s = emalloc(10+strlen(service));
  170. strcpy(s, "/srv/");
  171. strcat(s, service);
  172. if(dirwstat(s, &d) < 0)
  173. fprint(2, "factotum warning: cannot chmod 666 %s: %r\n", s);
  174. free(s);
  175. }
  176. exits(nil);
  177. }
  178. char *pmsg = "Warning! %s can't protect itself from debugging: %r\n";
  179. char *smsg = "Warning! %s can't turn off swapping: %r\n";
  180. /* don't allow other processes to debug us and steal keys */
  181. static void
  182. private(void)
  183. {
  184. int fd;
  185. char buf[64];
  186. snprint(buf, sizeof(buf), "#p/%d/ctl", getpid());
  187. fd = open(buf, OWRITE);
  188. if(fd < 0){
  189. fprint(2, pmsg, argv0);
  190. return;
  191. }
  192. if(fprint(fd, "private") < 0)
  193. fprint(2, pmsg, argv0);
  194. if(fprint(fd, "noswap") < 0)
  195. fprint(2, smsg, argv0);
  196. close(fd);
  197. }
  198. static void
  199. notifyf(void*, char *s)
  200. {
  201. if(strncmp(s, "interrupt", 9) == 0)
  202. noted(NCONT);
  203. noted(NDFLT);
  204. }
  205. enum
  206. {
  207. Qroot,
  208. Qfactotum,
  209. Qrpc,
  210. Qkeylist,
  211. Qprotolist,
  212. Qconfirm,
  213. Qlog,
  214. Qctl,
  215. Qneedkey,
  216. };
  217. Qid
  218. mkqid(int type, int path)
  219. {
  220. Qid q;
  221. q.type = type;
  222. q.path = path;
  223. q.vers = 0;
  224. return q;
  225. }
  226. static void
  227. fsattach(Req *r)
  228. {
  229. r->fid->qid = mkqid(QTDIR, Qroot);
  230. r->ofcall.qid = r->fid->qid;
  231. respond(r, nil);
  232. }
  233. static struct {
  234. char *name;
  235. int qidpath;
  236. ulong perm;
  237. } dirtab[] = {
  238. "confirm", Qconfirm, 0600|DMEXCL, /* we know this is slot #0 below */
  239. "needkey", Qneedkey, 0600|DMEXCL, /* we know this is slot #1 below */
  240. "ctl", Qctl, 0644,
  241. "rpc", Qrpc, 0666,
  242. "proto", Qprotolist, 0444,
  243. "log", Qlog, 0400|DMEXCL,
  244. };
  245. static int inuse[nelem(dirtab)];
  246. int *confirminuse = &inuse[0];
  247. int *needkeyinuse = &inuse[1];
  248. static void
  249. fillstat(Dir *dir, char *name, int type, int path, ulong perm)
  250. {
  251. dir->name = estrdup(name);
  252. dir->uid = estrdup(owner);
  253. dir->gid = estrdup(owner);
  254. dir->mode = perm;
  255. dir->length = 0;
  256. dir->qid = mkqid(type, path);
  257. dir->atime = time(0);
  258. dir->mtime = time(0);
  259. dir->muid = estrdup("");
  260. }
  261. static int
  262. rootdirgen(int n, Dir *dir, void*)
  263. {
  264. if(n > 0)
  265. return -1;
  266. fillstat(dir, "factotum", QTDIR, Qfactotum, DMDIR|0555);
  267. return 0;
  268. }
  269. static int
  270. fsdirgen(int n, Dir *dir, void*)
  271. {
  272. if(n >= nelem(dirtab))
  273. return -1;
  274. fillstat(dir, dirtab[n].name, 0, dirtab[n].qidpath, dirtab[n].perm);
  275. return 0;
  276. }
  277. static char*
  278. fswalk1(Fid *fid, char *name, Qid *qid)
  279. {
  280. int i;
  281. switch((ulong)fid->qid.path){
  282. default:
  283. return "cannot happen";
  284. case Qroot:
  285. if(strcmp(name, "factotum") == 0){
  286. *qid = mkqid(QTDIR, Qfactotum);
  287. fid->qid = *qid;
  288. return nil;
  289. }
  290. if(strcmp(name, "..") == 0){
  291. *qid = fid->qid;
  292. return nil;
  293. }
  294. return "not found";
  295. case Qfactotum:
  296. for(i=0; i<nelem(dirtab); i++)
  297. if(strcmp(name, dirtab[i].name) == 0){
  298. *qid = mkqid(0, dirtab[i].qidpath);
  299. fid->qid = *qid;
  300. return nil;
  301. }
  302. if(strcmp(name, "..") == 0){
  303. *qid = mkqid(QTDIR, Qroot);
  304. fid->qid = *qid;
  305. return nil;
  306. }
  307. return "not found";
  308. }
  309. }
  310. static void
  311. fsstat(Req *r)
  312. {
  313. int i;
  314. ulong path;
  315. path = r->fid->qid.path;
  316. if(path == Qroot){
  317. fillstat(&r->d, "/", QTDIR, Qroot, 0555|DMDIR);
  318. respond(r, nil);
  319. return;
  320. }
  321. if(path == Qfactotum){
  322. fillstat(&r->d, "factotum", QTDIR, Qfactotum, 0555|DMDIR);
  323. respond(r, nil);
  324. return;
  325. }
  326. for(i=0; i<nelem(dirtab); i++)
  327. if(dirtab[i].qidpath == path){
  328. fillstat(&r->d, dirtab[i].name, 0, dirtab[i].qidpath, dirtab[i].perm);
  329. respond(r, nil);
  330. return;
  331. }
  332. respond(r, "file not found");
  333. }
  334. static void
  335. fsopen(Req *r)
  336. {
  337. int i, *p, perm;
  338. static int need[4] = {4, 2, 6, 1};
  339. int n;
  340. Fsstate *fss;
  341. p = nil;
  342. for(i=0; i<nelem(dirtab); i++)
  343. if(dirtab[i].qidpath == r->fid->qid.path)
  344. break;
  345. if(i < nelem(dirtab)){
  346. if(dirtab[i].perm & DMEXCL)
  347. p = &inuse[i];
  348. if(strcmp(r->fid->uid, owner) == 0)
  349. perm = dirtab[i].perm>>6;
  350. else
  351. perm = dirtab[i].perm;
  352. }else
  353. perm = 5;
  354. n = need[r->ifcall.mode&3];
  355. if((r->ifcall.mode&~(3|OTRUNC)) || ((perm&n) != n)){
  356. respond(r, "permission denied");
  357. return;
  358. }
  359. if(p){
  360. if(*p){
  361. respond(r, "file in use");
  362. return;
  363. }
  364. (*p)++;
  365. }
  366. r->fid->aux = fss = emalloc(sizeof(Fsstate));
  367. fss->phase = Notstarted;
  368. fss->sysuser = r->fid->uid;
  369. fss->attr = nil;
  370. strcpy(fss->err, "factotum/fs.c no error");
  371. respond(r, nil);
  372. }
  373. static void
  374. fsdestroyfid(Fid *fid)
  375. {
  376. int i;
  377. Fsstate *fss;
  378. if(fid->omode != -1){
  379. for(i=0; i<nelem(dirtab); i++)
  380. if(dirtab[i].qidpath == fid->qid.path)
  381. if(dirtab[i].perm&DMEXCL)
  382. inuse[i] = 0;
  383. }
  384. fss = fid->aux;
  385. if(fss == nil)
  386. return;
  387. if(fss->ps)
  388. (*fss->proto->close)(fss);
  389. _freeattr(fss->attr);
  390. free(fss);
  391. }
  392. static int
  393. readlist(int off, int (*gen)(int, char*, uint, Fsstate*), Req *r, Fsstate *fss)
  394. {
  395. char *a, *ea;
  396. int n;
  397. a = r->ofcall.data;
  398. ea = a+r->ifcall.count;
  399. for(;;){
  400. n = (*gen)(off, a, ea-a, fss);
  401. if(n == 0){
  402. r->ofcall.count = a - (char*)r->ofcall.data;
  403. return off;
  404. }
  405. a += n;
  406. off++;
  407. }
  408. }
  409. static int
  410. keylist(int i, char *a, uint n, Fsstate *fss)
  411. {
  412. char buf[512];
  413. Keyinfo ki;
  414. Key *k;
  415. k = nil;
  416. mkkeyinfo(&ki, fss, nil);
  417. ki.attr = nil;
  418. ki.skip = i;
  419. ki.usedisabled = 1;
  420. if(findkey(&k, &ki, "") != RpcOk)
  421. return 0;
  422. snprint(buf, sizeof buf, "key %A %N\n", k->attr, k->privattr);
  423. closekey(k);
  424. strcpy(buf+sizeof buf-2, "\n"); /* if line is really long, just truncate */
  425. if(strlen(buf) > n)
  426. return 0;
  427. n = strlen(buf);
  428. memmove(a, buf, n);
  429. return n;
  430. }
  431. static int
  432. protolist(int i, char *a, uint n, Fsstate *fss)
  433. {
  434. USED(fss);
  435. if(i >= nelem(prototab)-1)
  436. return 0;
  437. if(strlen(prototab[i]->name)+1 > n)
  438. return 0;
  439. n = strlen(prototab[i]->name)+1;
  440. memmove(a, prototab[i]->name, n-1);
  441. a[n-1] = '\n';
  442. return n;
  443. }
  444. static void
  445. fsread(Req *r)
  446. {
  447. Fsstate *s;
  448. s = r->fid->aux;
  449. switch((ulong)r->fid->qid.path){
  450. default:
  451. respond(r, "bug in fsread");
  452. break;
  453. case Qroot:
  454. dirread9p(r, rootdirgen, nil);
  455. respond(r, nil);
  456. break;
  457. case Qfactotum:
  458. dirread9p(r, fsdirgen, nil);
  459. respond(r, nil);
  460. break;
  461. case Qrpc:
  462. rpcread(r);
  463. break;
  464. case Qneedkey:
  465. needkeyread(r);
  466. break;
  467. case Qconfirm:
  468. confirmread(r);
  469. break;
  470. case Qlog:
  471. logread(r);
  472. break;
  473. case Qctl:
  474. s->listoff = readlist(s->listoff, keylist, r, s);
  475. respond(r, nil);
  476. break;
  477. case Qprotolist:
  478. s->listoff = readlist(s->listoff, protolist, r, s);
  479. respond(r, nil);
  480. break;
  481. }
  482. }
  483. static void
  484. fswrite(Req *r)
  485. {
  486. int ret;
  487. char err[ERRMAX], *s;
  488. switch((ulong)r->fid->qid.path){
  489. default:
  490. respond(r, "bug in fswrite");
  491. break;
  492. case Qrpc:
  493. rpcwrite(r);
  494. break;
  495. case Qneedkey:
  496. case Qconfirm:
  497. case Qctl:
  498. s = emalloc(r->ifcall.count+1);
  499. memmove(s, r->ifcall.data, r->ifcall.count);
  500. s[r->ifcall.count] = '\0';
  501. switch((ulong)r->fid->qid.path){
  502. default:
  503. abort();
  504. case Qneedkey:
  505. ret = needkeywrite(s);
  506. break;
  507. case Qconfirm:
  508. ret = confirmwrite(s);
  509. break;
  510. case Qctl:
  511. ret = ctlwrite(s, 0);
  512. break;
  513. }
  514. free(s);
  515. if(ret < 0){
  516. rerrstr(err, sizeof err);
  517. respond(r, err);
  518. }else{
  519. r->ofcall.count = r->ifcall.count;
  520. respond(r, nil);
  521. }
  522. break;
  523. }
  524. }
  525. static void
  526. fsflush(Req *r)
  527. {
  528. confirmflush(r->oldreq);
  529. needkeyflush(r->oldreq);
  530. logflush(r->oldreq);
  531. respond(r, nil);
  532. }
  533. Srv fs = {
  534. .attach= fsattach,
  535. .walk1= fswalk1,
  536. .open= fsopen,
  537. .read= fsread,
  538. .write= fswrite,
  539. .stat= fsstat,
  540. .flush= fsflush,
  541. .destroyfid= fsdestroyfid,
  542. };