secstored.c 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399
  1. #include <u.h>
  2. #include <libc.h>
  3. #include <bio.h>
  4. #include <ndb.h>
  5. #include <mp.h>
  6. #include <libsec.h>
  7. #include "SConn.h"
  8. #include "secstore.h"
  9. char* secureidcheck(char *, char *); // from /sys/src/cmd/auth/
  10. extern char* dirls(char *path);
  11. int verbose;
  12. Ndb *db;
  13. static void
  14. usage(void)
  15. {
  16. fprint(2, "usage: secstored [-R] [-S servername] [-s tcp!*!5356] [-v] [-x netmtpt]\n");
  17. exits("usage");
  18. }
  19. static int
  20. getdir(SConn *conn, char *id)
  21. {
  22. char *ls, *s;
  23. uchar *msg;
  24. int n, len;
  25. s = emalloc(Maxmsg);
  26. snprint(s, Maxmsg, "%s/store/%s", SECSTORE_DIR, id);
  27. if((ls = dirls(s)) == nil)
  28. len = 0;
  29. else
  30. len = strlen(ls);
  31. /* send file size */
  32. snprint(s, Maxmsg, "%d", len);
  33. conn->write(conn, (uchar*)s, strlen(s));
  34. /* send directory listing in Maxmsg chunks */
  35. n = Maxmsg;
  36. msg = (uchar*)ls;
  37. while(len > 0){
  38. if(len < Maxmsg)
  39. n = len;
  40. conn->write(conn, msg, n);
  41. msg += n;
  42. len -= n;
  43. }
  44. free(s);
  45. free(ls);
  46. return 0;
  47. }
  48. static int
  49. getfile(SConn *conn, char *id, char *gf)
  50. {
  51. int n, gd, len;
  52. ulong mode;
  53. char *s;
  54. Dir *st;
  55. if(strcmp(gf,".")==0)
  56. return getdir(conn, id);
  57. /* send file size */
  58. s = emalloc(Maxmsg);
  59. snprint(s, Maxmsg, "%s/store/%s/%s", SECSTORE_DIR, id, gf);
  60. gd = open(s, OREAD);
  61. if(gd < 0){
  62. syslog(0, LOG, "can't open %s: %r\n", s);
  63. free(s);
  64. conn->write(conn, (uchar*)"-1", 2);
  65. return -1;
  66. }
  67. st = dirfstat(gd);
  68. if(st == nil){
  69. syslog(0, LOG, "can't stat %s: %r\n", s);
  70. free(s);
  71. conn->write(conn, (uchar*)"-1", 2);
  72. return -1;
  73. }
  74. mode = st->mode;
  75. len = st->length;
  76. free(st);
  77. if(mode & DMDIR) {
  78. syslog(0, LOG, "%s should be a plain file, not a directory\n", s);
  79. free(s);
  80. conn->write(conn, (uchar*)"-1", 2);
  81. return -1;
  82. }
  83. if(len < 0 || len > MAXFILESIZE){
  84. syslog(0, LOG, "implausible filesize %d for %s\n", len, gf);
  85. free(s);
  86. conn->write(conn, (uchar*)"-3", 2);
  87. return -1;
  88. }
  89. snprint(s, Maxmsg, "%d", len);
  90. conn->write(conn, (uchar*)s, strlen(s));
  91. /* send file in Maxmsg chunks */
  92. while(len > 0){
  93. n = read(gd, s, Maxmsg);
  94. if(n <= 0){
  95. syslog(0, LOG, "read error on %s: %r\n", gf);
  96. free(s);
  97. return -1;
  98. }
  99. conn->write(conn, (uchar*)s, n);
  100. len -= n;
  101. }
  102. close(gd);
  103. free(s);
  104. return 0;
  105. }
  106. static int
  107. putfile(SConn *conn, char *id, char *pf)
  108. {
  109. int n, nw, pd;
  110. long len;
  111. char s[Maxmsg+1];
  112. /* get file size */
  113. n = readstr(conn, s);
  114. if(n < 0){
  115. syslog(0, LOG, "remote: %s: %r\n", s);
  116. return -1;
  117. }
  118. len = atoi(s);
  119. if(len == -1){
  120. syslog(0, LOG, "remote file %s does not exist\n", pf);
  121. return -1;
  122. }else if(len < 0 || len > MAXFILESIZE){
  123. syslog(0, LOG, "implausible filesize %ld for %s\n", len, pf);
  124. return -1;
  125. }
  126. /* get file in Maxmsg chunks */
  127. if(strchr(pf,'/') != nil || strcmp(pf,"..")==0){
  128. syslog(0, LOG, "no slashes allowed: %s\n", pf);
  129. return -1;
  130. }
  131. snprint(s, Maxmsg, "%s/store/%s/%s", SECSTORE_DIR, id, pf);
  132. pd = create(s, OWRITE, 0660);
  133. if(pd < 0){
  134. syslog(0, LOG, "can't open %s: %r\n", s);
  135. return -1;
  136. }
  137. while(len > 0){
  138. n = conn->read(conn, (uchar*)s, Maxmsg);
  139. if(n <= 0){
  140. syslog(0, LOG, "empty file chunk\n");
  141. return -1;
  142. }
  143. nw = write(pd, s, n);
  144. if(nw != n){
  145. syslog(0, LOG, "write error on %s: %r", pf);
  146. return -1;
  147. }
  148. len -= n;
  149. }
  150. close(pd);
  151. return 0;
  152. }
  153. static int
  154. removefile(SConn *conn, char *id, char *f)
  155. {
  156. Dir *d;
  157. char buf[Maxmsg];
  158. snprint(buf, Maxmsg, "%s/store/%s/%s", SECSTORE_DIR, id, f);
  159. if((d = dirstat(buf)) == nil){
  160. snprint(buf, sizeof buf, "remove failed: %r");
  161. writerr(conn, buf);
  162. return -1;
  163. }else if(d->mode & DMDIR){
  164. snprint(buf, sizeof buf, "can't remove a directory");
  165. writerr(conn, buf);
  166. free(d);
  167. return -1;
  168. }
  169. free(d);
  170. if(remove(buf) < 0){
  171. snprint(buf, sizeof buf, "remove failed: %r");
  172. writerr(conn, buf);
  173. return -1;
  174. }
  175. return 0;
  176. }
  177. /* given line directory from accept, returns ipaddr!port */
  178. static char*
  179. remoteIP(char *ldir)
  180. {
  181. int fd, n;
  182. char rp[100], ap[500];
  183. snprint(rp, sizeof rp, "%s/remote", ldir);
  184. fd = open(rp, OREAD);
  185. if(fd < 0)
  186. return strdup("?!?");
  187. n = read(fd, ap, sizeof ap);
  188. if(n <= 0 || n == sizeof ap){
  189. fprint(2, "secstored: error %d reading %s: %r\n", n, rp);
  190. return strdup("?!?");
  191. }
  192. close(fd);
  193. ap[n--] = 0;
  194. if(ap[n] == '\n')
  195. ap[n] = 0;
  196. return strdup(ap);
  197. }
  198. static int
  199. dologin(int fd, char *S, int forceSTA)
  200. {
  201. int i, n, rv;
  202. char *file, *mess;
  203. char msg[Maxmsg+1];
  204. PW *pw;
  205. SConn *conn;
  206. pw = nil;
  207. rv = -1;
  208. // collect the first message
  209. if((conn = newSConn(fd)) == nil)
  210. return -1;
  211. if(readstr(conn, msg) < 0){
  212. fprint(2, "secstored: remote: %s: %r\n", msg);
  213. writerr(conn, "can't read your first message");
  214. goto Out;
  215. }
  216. // authenticate
  217. if(PAKserver(conn, S, msg, &pw) < 0){
  218. if(pw != nil)
  219. syslog(0, LOG, "secstore denied for %s", pw->id);
  220. goto Out;
  221. }
  222. if((forceSTA || pw->status&STA) != 0){
  223. conn->write(conn, (uchar*)"STA", 3);
  224. if(readstr(conn, msg) < 10 || strncmp(msg, "STA", 3) != 0){
  225. syslog(0, LOG, "no STA from %s", pw->id);
  226. goto Out;
  227. }
  228. mess = secureidcheck(pw->id, msg+3);
  229. if(mess != nil){
  230. syslog(0, LOG, "secureidcheck denied %s because %s", pw->id, mess);
  231. goto Out;
  232. }
  233. }
  234. conn->write(conn, (uchar*)"OK", 2);
  235. syslog(0, LOG, "AUTH %s", pw->id);
  236. // perform operations as asked
  237. while((n = readstr(conn, msg)) > 0){
  238. syslog(0, LOG, "[%s] %s", pw->id, msg);
  239. if(strncmp(msg, "GET ", 4) == 0){
  240. file = validatefile(msg+4);
  241. if(file==nil || getfile(conn, pw->id, file) < 0)
  242. goto Err;
  243. }else if(strncmp(msg, "PUT ", 4) == 0){
  244. file = validatefile(msg+4);
  245. if(file==nil || putfile(conn, pw->id, file) < 0){
  246. syslog(0, LOG, "failed PUT %s/%s", pw->id, file);
  247. goto Err;
  248. }
  249. }else if(strncmp(msg, "RM ", 3) == 0){
  250. file = validatefile(msg+3);
  251. if(file==nil || removefile(conn, pw->id, file) < 0){
  252. syslog(0, LOG, "failed RM %s/%s", pw->id, file);
  253. goto Err;
  254. }
  255. }else if(strncmp(msg, "CHPASS", 6) == 0){
  256. if(readstr(conn, msg) < 0){
  257. syslog(0, LOG, "protocol botch CHPASS for %s", pw->id);
  258. writerr(conn, "protocol botch while setting PAK");
  259. goto Out;
  260. }
  261. pw->Hi = strtomp(msg, nil, 64, pw->Hi);
  262. for(i=0; i < 4 && putPW(pw) < 0; i++)
  263. syslog(0, LOG, "password change failed for %s (%d): %r", pw->id, i);
  264. if(i==4)
  265. goto Out;
  266. }else if(strncmp(msg, "BYE", 3) == 0){
  267. rv = 0;
  268. break;
  269. }else{
  270. writerr(conn, "unrecognized operation");
  271. break;
  272. }
  273. }
  274. if(n <= 0)
  275. syslog(0, LOG, "%s closed connection without saying goodbye\n", pw->id);
  276. Out:
  277. freePW(pw);
  278. conn->free(conn);
  279. return rv;
  280. Err:
  281. writerr(conn, "operation failed");
  282. goto Out;
  283. }
  284. void
  285. main(int argc, char **argv)
  286. {
  287. int afd, dfd, lcfd, forceSTA = 0;
  288. char adir[40], ldir[40], *remote;
  289. char *serve = "tcp!*!5356", *p, aserve[128], net[128];
  290. char *S = "secstore";
  291. Ndb *db2;
  292. setnetmtpt(net, sizeof(net), nil);
  293. ARGBEGIN{
  294. case 'R':
  295. forceSTA = 1;
  296. break;
  297. case 's':
  298. serve = EARGF(usage());
  299. break;
  300. case 'S':
  301. S = EARGF(usage());
  302. break;
  303. case 'x':
  304. p = ARGF();
  305. if(p == nil)
  306. usage();
  307. setnetmtpt(net, sizeof(net), p);
  308. break;
  309. case 'v':
  310. verbose++;
  311. break;
  312. default:
  313. usage();
  314. }ARGEND;
  315. if(!verbose)
  316. switch(rfork(RFNOTEG|RFPROC|RFFDG)) {
  317. case -1:
  318. sysfatal("fork: %r");
  319. case 0:
  320. break;
  321. default:
  322. exits(0);
  323. }
  324. snprint(aserve, sizeof aserve, "%s/%s", net, serve);
  325. afd = announce(aserve, adir);
  326. if(afd < 0)
  327. sysfatal("%s: %r\n", aserve);
  328. syslog(0, LOG, "ANNOUNCE %s", aserve);
  329. for(;;){
  330. if((lcfd = listen(adir, ldir)) < 0)
  331. exits("can't listen");
  332. switch(fork()){
  333. case -1:
  334. fprint(2, "secstore forking: %r\n");
  335. close(lcfd);
  336. break;
  337. case 0:
  338. // "/lib/ndb/common.radius does not exist" if db set before fork
  339. db = ndbopen("/lib/ndb/auth");
  340. if(db == 0)
  341. syslog(0, LOG, "no /lib/ndb/auth");
  342. db2 = ndbopen(0);
  343. if(db2 == 0)
  344. syslog(0, LOG, "no /lib/ndb/local");
  345. db = ndbcat(db, db2);
  346. if((dfd = accept(lcfd, ldir)) < 0)
  347. exits("can't accept");
  348. alarm(30*60*1000); // 30 min
  349. remote = remoteIP(ldir);
  350. syslog(0, LOG, "secstore from %s", remote);
  351. free(remote);
  352. dologin(dfd, S, forceSTA);
  353. exits(nil);
  354. default:
  355. close(lcfd);
  356. break;
  357. }
  358. }
  359. }