secstored.c 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396
  1. /* secstored - secure store daemon */
  2. #include <u.h>
  3. #include <libc.h>
  4. #include <bio.h>
  5. #include <ndb.h>
  6. #include <mp.h>
  7. #include <libsec.h>
  8. #include "SConn.h"
  9. #include "secstore.h"
  10. char* secureidcheck(char *, char *); /* from /sys/src/cmd/auth/ */
  11. extern char* dirls(char *path);
  12. int verbose;
  13. Ndb *db;
  14. static void
  15. usage(void)
  16. {
  17. fprint(2, "usage: secstored [-R] [-S servername] [-s tcp!*!5356] "
  18. "[-v] [-x netmtpt]\n");
  19. exits("usage");
  20. }
  21. static int
  22. getdir(SConn *conn, char *id)
  23. {
  24. char *ls, *s;
  25. uchar *msg;
  26. int n, len;
  27. s = emalloc(Maxmsg);
  28. snprint(s, Maxmsg, "%s/store/%s", SECSTORE_DIR, id);
  29. if((ls = dirls(s)) == nil)
  30. len = 0;
  31. else
  32. len = strlen(ls);
  33. /* send file size */
  34. snprint(s, Maxmsg, "%d", len);
  35. conn->write(conn, (uchar*)s, strlen(s));
  36. /* send directory listing in Maxmsg chunks */
  37. n = Maxmsg;
  38. msg = (uchar*)ls;
  39. while(len > 0){
  40. if(len < Maxmsg)
  41. n = len;
  42. conn->write(conn, msg, n);
  43. msg += n;
  44. len -= n;
  45. }
  46. free(s);
  47. free(ls);
  48. return 0;
  49. }
  50. static int
  51. getfile(SConn *conn, char *id, char *gf)
  52. {
  53. int n, gd, len;
  54. ulong mode;
  55. char *s;
  56. Dir *st;
  57. if(strcmp(gf,".")==0)
  58. return getdir(conn, id);
  59. /* send file size */
  60. s = emalloc(Maxmsg);
  61. snprint(s, Maxmsg, "%s/store/%s/%s", SECSTORE_DIR, id, gf);
  62. gd = open(s, OREAD);
  63. if(gd < 0){
  64. syslog(0, LOG, "can't open %s: %r", s);
  65. free(s);
  66. conn->write(conn, (uchar*)"-1", 2);
  67. return -1;
  68. }
  69. st = dirfstat(gd);
  70. if(st == nil){
  71. syslog(0, LOG, "can't stat %s: %r", s);
  72. free(s);
  73. conn->write(conn, (uchar*)"-1", 2);
  74. return -1;
  75. }
  76. mode = st->mode;
  77. len = st->length;
  78. free(st);
  79. if(mode & DMDIR) {
  80. syslog(0, LOG, "%s should be a plain file, not a directory", s);
  81. free(s);
  82. conn->write(conn, (uchar*)"-1", 2);
  83. return -1;
  84. }
  85. if(len < 0 || len > MAXFILESIZE){
  86. syslog(0, LOG, "implausible filesize %d for %s", len, gf);
  87. free(s);
  88. conn->write(conn, (uchar*)"-3", 2);
  89. return -1;
  90. }
  91. snprint(s, Maxmsg, "%d", len);
  92. conn->write(conn, (uchar*)s, strlen(s));
  93. /* send file in Maxmsg chunks */
  94. while(len > 0){
  95. n = read(gd, s, Maxmsg);
  96. if(n <= 0){
  97. syslog(0, LOG, "read error on %s: %r", gf);
  98. free(s);
  99. return -1;
  100. }
  101. conn->write(conn, (uchar*)s, n);
  102. len -= n;
  103. }
  104. close(gd);
  105. free(s);
  106. return 0;
  107. }
  108. static int
  109. putfile(SConn *conn, char *id, char *pf)
  110. {
  111. int n, nw, pd;
  112. long len;
  113. char s[Maxmsg+1];
  114. /* get file size */
  115. n = readstr(conn, s);
  116. if(n < 0){
  117. syslog(0, LOG, "remote: %s: %r", s);
  118. return -1;
  119. }
  120. len = atoi(s);
  121. if(len == -1){
  122. syslog(0, LOG, "remote file %s does not exist", pf);
  123. return -1;
  124. }else if(len < 0 || len > MAXFILESIZE){
  125. syslog(0, LOG, "implausible filesize %ld for %s", len, pf);
  126. return -1;
  127. }
  128. snprint(s, Maxmsg, "%s/store/%s/%s", SECSTORE_DIR, id, pf);
  129. pd = create(s, OWRITE, 0660);
  130. if(pd < 0){
  131. syslog(0, LOG, "can't open %s: %r\n", s);
  132. return -1;
  133. }
  134. while(len > 0){
  135. n = conn->read(conn, (uchar*)s, Maxmsg);
  136. if(n <= 0){
  137. syslog(0, LOG, "empty file chunk");
  138. return -1;
  139. }
  140. nw = write(pd, s, n);
  141. if(nw != n){
  142. syslog(0, LOG, "write error on %s: %r", pf);
  143. return -1;
  144. }
  145. len -= n;
  146. }
  147. close(pd);
  148. return 0;
  149. }
  150. static int
  151. removefile(SConn *conn, char *id, char *f)
  152. {
  153. Dir *d;
  154. char buf[Maxmsg];
  155. snprint(buf, Maxmsg, "%s/store/%s/%s", SECSTORE_DIR, id, f);
  156. if((d = dirstat(buf)) == nil){
  157. snprint(buf, sizeof buf, "remove failed: %r");
  158. writerr(conn, buf);
  159. return -1;
  160. }else if(d->mode & DMDIR){
  161. snprint(buf, sizeof buf, "can't remove a directory");
  162. writerr(conn, buf);
  163. free(d);
  164. return -1;
  165. }
  166. free(d);
  167. if(remove(buf) < 0){
  168. snprint(buf, sizeof buf, "remove failed: %r");
  169. writerr(conn, buf);
  170. return -1;
  171. }
  172. return 0;
  173. }
  174. /* given line directory from accept, returns ipaddr!port */
  175. static char*
  176. remoteIP(char *ldir)
  177. {
  178. int fd, n;
  179. char rp[100], ap[500];
  180. snprint(rp, sizeof rp, "%s/remote", ldir);
  181. fd = open(rp, OREAD);
  182. if(fd < 0)
  183. return strdup("?!?");
  184. n = read(fd, ap, sizeof ap);
  185. if(n <= 0 || n == sizeof ap){
  186. fprint(2, "secstored: error %d reading %s: %r\n", n, rp);
  187. return strdup("?!?");
  188. }
  189. close(fd);
  190. ap[n--] = 0;
  191. if(ap[n] == '\n')
  192. ap[n] = 0;
  193. return strdup(ap);
  194. }
  195. static int
  196. dologin(int fd, char *S, int forceSTA)
  197. {
  198. int i, n, rv;
  199. char *file, *mess, *nl;
  200. char msg[Maxmsg+1];
  201. PW *pw;
  202. SConn *conn;
  203. pw = nil;
  204. rv = -1;
  205. /* collect the first message */
  206. if((conn = newSConn(fd)) == nil)
  207. return -1;
  208. if(readstr(conn, msg) < 0){
  209. fprint(2, "secstored: remote: %s: %r\n", msg);
  210. writerr(conn, "can't read your first message");
  211. goto Out;
  212. }
  213. /* authenticate */
  214. if(PAKserver(conn, S, msg, &pw) < 0){
  215. if(pw != nil)
  216. syslog(0, LOG, "secstore denied for %s", pw->id);
  217. goto Out;
  218. }
  219. if((forceSTA || pw->status&STA) != 0){
  220. conn->write(conn, (uchar*)"STA", 3);
  221. if(readstr(conn, msg) < 10 || strncmp(msg, "STA", 3) != 0){
  222. syslog(0, LOG, "no STA from %s", pw->id);
  223. goto Out;
  224. }
  225. mess = secureidcheck(pw->id, msg+3);
  226. if(mess != nil){
  227. syslog(0, LOG, "secureidcheck denied %s because %s", pw->id, mess);
  228. goto Out;
  229. }
  230. }
  231. conn->write(conn, (uchar*)"OK", 2);
  232. syslog(0, LOG, "AUTH %s", pw->id);
  233. /* perform operations as asked */
  234. while((n = readstr(conn, msg)) > 0){
  235. if(nl = strchr(msg, '\n'))
  236. *nl = 0;
  237. syslog(0, LOG, "[%s] %s", pw->id, msg);
  238. if(strncmp(msg, "GET ", 4) == 0){
  239. file = validatefile(msg+4);
  240. if(file==nil || getfile(conn, pw->id, file) < 0)
  241. goto Err;
  242. }else if(strncmp(msg, "PUT ", 4) == 0){
  243. file = validatefile(msg+4);
  244. if(file==nil || putfile(conn, pw->id, file) < 0){
  245. syslog(0, LOG, "failed PUT %s/%s", pw->id, file);
  246. goto Err;
  247. }
  248. }else if(strncmp(msg, "RM ", 3) == 0){
  249. file = validatefile(msg+3);
  250. if(file==nil || removefile(conn, pw->id, file) < 0){
  251. syslog(0, LOG, "failed RM %s/%s", pw->id, file);
  252. goto Err;
  253. }
  254. }else if(strncmp(msg, "CHPASS", 6) == 0){
  255. if(readstr(conn, msg) < 0){
  256. syslog(0, LOG, "protocol botch CHPASS for %s", pw->id);
  257. writerr(conn, "protocol botch while setting PAK");
  258. goto Out;
  259. }
  260. pw->Hi = strtomp(msg, nil, 64, pw->Hi);
  261. for(i=0; i < 4 && putPW(pw) < 0; i++)
  262. syslog(0, LOG, "password change failed for %s (%d): %r", pw->id, i);
  263. if(i==4)
  264. goto Out;
  265. }else if(strncmp(msg, "BYE", 3) == 0){
  266. rv = 0;
  267. break;
  268. }else{
  269. writerr(conn, "unrecognized operation");
  270. break;
  271. }
  272. }
  273. if(n <= 0)
  274. syslog(0, LOG, "%s closed connection without saying goodbye", pw->id);
  275. Out:
  276. freePW(pw);
  277. conn->free(conn);
  278. return rv;
  279. Err:
  280. writerr(conn, "operation failed");
  281. goto Out;
  282. }
  283. void
  284. main(int argc, char **argv)
  285. {
  286. int afd, dfd, lcfd, forceSTA = 0;
  287. char aserve[128], net[128], adir[40], ldir[40];
  288. char *remote, *serve = "tcp!*!5356", *S = "secstore";
  289. Ndb *db2;
  290. setnetmtpt(net, sizeof(net), nil);
  291. ARGBEGIN{
  292. case 'R':
  293. forceSTA = 1;
  294. break;
  295. case 's':
  296. serve = EARGF(usage());
  297. break;
  298. case 'S':
  299. S = EARGF(usage());
  300. break;
  301. case 'x':
  302. setnetmtpt(net, sizeof(net), EARGF(usage()));
  303. break;
  304. case 'v':
  305. verbose++;
  306. break;
  307. default:
  308. usage();
  309. }ARGEND;
  310. if(!verbose)
  311. switch(rfork(RFNOTEG|RFPROC|RFFDG)) {
  312. case -1:
  313. sysfatal("fork: %r");
  314. case 0:
  315. break;
  316. default:
  317. exits(0);
  318. }
  319. snprint(aserve, sizeof aserve, "%s/%s", net, serve);
  320. afd = announce(aserve, adir);
  321. if(afd < 0)
  322. sysfatal("%s: %r", aserve);
  323. syslog(0, LOG, "ANNOUNCE %s", aserve);
  324. for(;;){
  325. if((lcfd = listen(adir, ldir)) < 0)
  326. exits("can't listen");
  327. switch(fork()){
  328. case -1:
  329. fprint(2, "secstore forking: %r\n");
  330. close(lcfd);
  331. break;
  332. case 0:
  333. /*
  334. * "/lib/ndb/common.radius does not exist"
  335. * if db set before fork.
  336. */
  337. db = ndbopen("/lib/ndb/auth");
  338. if(db == 0)
  339. syslog(0, LOG, "no /lib/ndb/auth");
  340. db2 = ndbopen(0);
  341. if(db2 == 0)
  342. syslog(0, LOG, "no /lib/ndb/local");
  343. db = ndbcat(db, db2);
  344. if((dfd = accept(lcfd, ldir)) < 0)
  345. exits("can't accept");
  346. alarm(30*60*1000); /* 30 min */
  347. remote = remoteIP(ldir);
  348. syslog(0, LOG, "secstore from %s", remote);
  349. free(remote);
  350. dologin(dfd, S, forceSTA);
  351. exits(nil);
  352. default:
  353. close(lcfd);
  354. break;
  355. }
  356. }
  357. }