fs.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594
  1. #include "dat.h"
  2. int askforkeys = 1;
  3. char *authaddr;
  4. int debug;
  5. int doprivate = 1;
  6. int gflag;
  7. char *owner;
  8. int kflag;
  9. char *mtpt = "/mnt";
  10. Keyring *ring;
  11. char *service;
  12. int sflag;
  13. int uflag;
  14. extern Srv fs;
  15. static void notifyf(void*, char*);
  16. static void private(void);
  17. char Easproto[] = "auth server protocol botch";
  18. char Ebadarg[] = "invalid argument";
  19. char Ebadkey[] = "bad key";
  20. char Enegotiation[] = "negotiation failed, no common protocols or keys";
  21. char Etoolarge[] = "rpc too large";
  22. Proto*
  23. prototab[] =
  24. {
  25. &apop,
  26. &chap,
  27. &cram,
  28. &httpdigest,
  29. &mschap,
  30. &p9any,
  31. &p9cr,
  32. &p9sk1,
  33. &p9sk2,
  34. &pass,
  35. /* &srs, */
  36. &rsa,
  37. &vnc,
  38. &wep,
  39. nil,
  40. };
  41. void
  42. usage(void)
  43. {
  44. fprint(2, "usage: %s [-DdkSun] [-s service] [-a authaddr] [-m mtpt]\n", argv0);
  45. fprint(2, "or %s -g 'params'\n", argv0);
  46. exits("usage");
  47. }
  48. void
  49. main(int argc, char **argv)
  50. {
  51. int i, trysecstore;
  52. char err[ERRMAX], *s;
  53. Dir d;
  54. Proto *p;
  55. char *secstorepw;
  56. trysecstore = 1;
  57. secstorepw = nil;
  58. ARGBEGIN{
  59. case 'D':
  60. chatty9p++;
  61. break;
  62. case 'S': /* server: read nvram, no prompting for keys */
  63. askforkeys = 0;
  64. trysecstore = 0;
  65. sflag = 1;
  66. break;
  67. case 'a':
  68. authaddr = EARGF(usage());
  69. break;
  70. case 'd':
  71. debug = 1;
  72. doprivate = 0;
  73. break;
  74. case 'g': /* get: prompt for key for name and domain */
  75. gflag = 1;
  76. break;
  77. case 'k': /* reinitialize nvram */
  78. kflag = 1;
  79. break;
  80. case 'm': /* set default mount point */
  81. mtpt = EARGF(usage());
  82. break;
  83. case 'n':
  84. trysecstore = 0;
  85. break;
  86. case 'p':
  87. doprivate = 0;
  88. break;
  89. case 's': /* set service name */
  90. service = EARGF(usage());
  91. break;
  92. case 'u': /* user: set hostowner */
  93. uflag = 1;
  94. break;
  95. default:
  96. usage();
  97. }ARGEND
  98. if(argc != 0 && !gflag)
  99. usage();
  100. if(doprivate)
  101. private();
  102. initcap();
  103. quotefmtinstall();
  104. fmtinstall('A', _attrfmt);
  105. fmtinstall('N', attrnamefmt);
  106. fmtinstall('H', encodefmt);
  107. ring = emalloc(sizeof(*ring));
  108. notify(notifyf);
  109. if(gflag){
  110. if(argc != 1)
  111. usage();
  112. askuser(argv[0]);
  113. exits(nil);
  114. }
  115. for(i=0; prototab[i]; i++){
  116. p = prototab[i];
  117. if(p->name == nil)
  118. sysfatal("protocol %d has no name", i);
  119. if(p->init == nil)
  120. sysfatal("protocol %s has no init", p->name);
  121. if(p->write == nil)
  122. sysfatal("protocol %s has no write", p->name);
  123. if(p->read == nil)
  124. sysfatal("protocol %s has no read", p->name);
  125. if(p->close == nil)
  126. sysfatal("protocol %s has no close", p->name);
  127. if(p->keyprompt == nil)
  128. p->keyprompt = "";
  129. }
  130. if(sflag){
  131. s = getnvramkey(kflag ? NVwrite : NVwriteonerr, &secstorepw);
  132. if(s == nil)
  133. fprint(2, "factotum warning: cannot read nvram: %r\n");
  134. else if(ctlwrite(s, 0) < 0)
  135. fprint(2, "factotum warning: cannot add nvram key: %r\n");
  136. if(secstorepw != nil)
  137. trysecstore = 1;
  138. if (s != nil) {
  139. memset(s, 0, strlen(s));
  140. free(s);
  141. }
  142. } else if(uflag)
  143. promptforhostowner();
  144. owner = getuser();
  145. if(trysecstore){
  146. if(havesecstore() == 1){
  147. while(secstorefetch(secstorepw) < 0){
  148. rerrstr(err, sizeof err);
  149. if(strcmp(err, "cancel") == 0)
  150. break;
  151. fprint(2, "factotum: secstorefetch: %r\n");
  152. fprint(2, "Enter an empty password to quit.\n");
  153. free(secstorepw);
  154. secstorepw = nil; /* just try nvram pw once */
  155. }
  156. }else{
  157. /*
  158. rerrstr(err, sizeof err);
  159. if(*err)
  160. fprint(2, "factotum: havesecstore: %r\n");
  161. */
  162. }
  163. }
  164. postmountsrv(&fs, service, mtpt, MBEFORE);
  165. if(service){
  166. nulldir(&d);
  167. d.mode = 0666;
  168. s = emalloc(10+strlen(service));
  169. strcpy(s, "/srv/");
  170. strcat(s, service);
  171. if(dirwstat(s, &d) < 0)
  172. fprint(2, "factotum warning: cannot chmod 666 %s: %r\n", s);
  173. free(s);
  174. }
  175. exits(nil);
  176. }
  177. char *pmsg = "Warning! %s can't protect itself from debugging: %r\n";
  178. char *smsg = "Warning! %s can't turn off swapping: %r\n";
  179. /* don't allow other processes to debug us and steal keys */
  180. static void
  181. private(void)
  182. {
  183. int fd;
  184. char buf[64];
  185. snprint(buf, sizeof(buf), "#p/%d/ctl", getpid());
  186. fd = open(buf, OWRITE);
  187. if(fd < 0){
  188. fprint(2, pmsg, argv0);
  189. return;
  190. }
  191. if(fprint(fd, "private") < 0)
  192. fprint(2, pmsg, argv0);
  193. if(fprint(fd, "noswap") < 0)
  194. fprint(2, smsg, argv0);
  195. close(fd);
  196. }
  197. static void
  198. notifyf(void*, char *s)
  199. {
  200. if(strncmp(s, "interrupt", 9) == 0)
  201. noted(NCONT);
  202. noted(NDFLT);
  203. }
  204. enum
  205. {
  206. Qroot,
  207. Qfactotum,
  208. Qrpc,
  209. Qkeylist,
  210. Qprotolist,
  211. Qconfirm,
  212. Qlog,
  213. Qctl,
  214. Qneedkey,
  215. };
  216. Qid
  217. mkqid(int type, int path)
  218. {
  219. Qid q;
  220. q.type = type;
  221. q.path = path;
  222. q.vers = 0;
  223. return q;
  224. }
  225. static void
  226. fsattach(Req *r)
  227. {
  228. r->fid->qid = mkqid(QTDIR, Qroot);
  229. r->ofcall.qid = r->fid->qid;
  230. respond(r, nil);
  231. }
  232. static struct {
  233. char *name;
  234. int qidpath;
  235. ulong perm;
  236. } dirtab[] = {
  237. "confirm", Qconfirm, 0600|DMEXCL, /* we know this is slot #0 below */
  238. "needkey", Qneedkey, 0600|DMEXCL, /* we know this is slot #1 below */
  239. "ctl", Qctl, 0644,
  240. "rpc", Qrpc, 0666,
  241. "proto", Qprotolist, 0444,
  242. "log", Qlog, 0400|DMEXCL,
  243. };
  244. static int inuse[nelem(dirtab)];
  245. int *confirminuse = &inuse[0];
  246. int *needkeyinuse = &inuse[1];
  247. static void
  248. fillstat(Dir *dir, char *name, int type, int path, ulong perm)
  249. {
  250. dir->name = estrdup(name);
  251. dir->uid = estrdup(owner);
  252. dir->gid = estrdup(owner);
  253. dir->mode = perm;
  254. dir->length = 0;
  255. dir->qid = mkqid(type, path);
  256. dir->atime = time(0);
  257. dir->mtime = time(0);
  258. dir->muid = estrdup("");
  259. }
  260. static int
  261. rootdirgen(int n, Dir *dir, void*)
  262. {
  263. if(n > 0)
  264. return -1;
  265. fillstat(dir, "factotum", QTDIR, Qfactotum, DMDIR|0555);
  266. return 0;
  267. }
  268. static int
  269. fsdirgen(int n, Dir *dir, void*)
  270. {
  271. if(n >= nelem(dirtab))
  272. return -1;
  273. fillstat(dir, dirtab[n].name, 0, dirtab[n].qidpath, dirtab[n].perm);
  274. return 0;
  275. }
  276. static char*
  277. fswalk1(Fid *fid, char *name, Qid *qid)
  278. {
  279. int i;
  280. switch((ulong)fid->qid.path){
  281. default:
  282. return "cannot happen";
  283. case Qroot:
  284. if(strcmp(name, "factotum") == 0){
  285. *qid = mkqid(QTDIR, Qfactotum);
  286. fid->qid = *qid;
  287. return nil;
  288. }
  289. if(strcmp(name, "..") == 0){
  290. *qid = fid->qid;
  291. return nil;
  292. }
  293. return "not found";
  294. case Qfactotum:
  295. for(i=0; i<nelem(dirtab); i++)
  296. if(strcmp(name, dirtab[i].name) == 0){
  297. *qid = mkqid(0, dirtab[i].qidpath);
  298. fid->qid = *qid;
  299. return nil;
  300. }
  301. if(strcmp(name, "..") == 0){
  302. *qid = mkqid(QTDIR, Qroot);
  303. fid->qid = *qid;
  304. return nil;
  305. }
  306. return "not found";
  307. }
  308. }
  309. static void
  310. fsstat(Req *r)
  311. {
  312. int i;
  313. ulong path;
  314. path = r->fid->qid.path;
  315. if(path == Qroot){
  316. fillstat(&r->d, "/", QTDIR, Qroot, 0555|DMDIR);
  317. respond(r, nil);
  318. return;
  319. }
  320. if(path == Qfactotum){
  321. fillstat(&r->d, "factotum", QTDIR, Qfactotum, 0555|DMDIR);
  322. respond(r, nil);
  323. return;
  324. }
  325. for(i=0; i<nelem(dirtab); i++)
  326. if(dirtab[i].qidpath == path){
  327. fillstat(&r->d, dirtab[i].name, 0, dirtab[i].qidpath, dirtab[i].perm);
  328. respond(r, nil);
  329. return;
  330. }
  331. respond(r, "file not found");
  332. }
  333. static void
  334. fsopen(Req *r)
  335. {
  336. int i, *p, perm;
  337. static int need[4] = {4, 2, 6, 1};
  338. int n;
  339. Fsstate *fss;
  340. p = nil;
  341. for(i=0; i<nelem(dirtab); i++)
  342. if(dirtab[i].qidpath == r->fid->qid.path)
  343. break;
  344. if(i < nelem(dirtab)){
  345. if(dirtab[i].perm & DMEXCL)
  346. p = &inuse[i];
  347. if(strcmp(r->fid->uid, owner) == 0)
  348. perm = dirtab[i].perm>>6;
  349. else
  350. perm = dirtab[i].perm;
  351. }else
  352. perm = 5;
  353. n = need[r->ifcall.mode&3];
  354. if((r->ifcall.mode&~(3|OTRUNC)) || ((perm&n) != n)){
  355. respond(r, "permission denied");
  356. return;
  357. }
  358. if(p){
  359. if(*p){
  360. respond(r, "file in use");
  361. return;
  362. }
  363. (*p)++;
  364. }
  365. r->fid->aux = fss = emalloc(sizeof(Fsstate));
  366. fss->phase = Notstarted;
  367. fss->sysuser = r->fid->uid;
  368. fss->attr = nil;
  369. strcpy(fss->err, "factotum/fs.c no error");
  370. respond(r, nil);
  371. }
  372. static void
  373. fsdestroyfid(Fid *fid)
  374. {
  375. int i;
  376. Fsstate *fss;
  377. if(fid->omode != -1){
  378. for(i=0; i<nelem(dirtab); i++)
  379. if(dirtab[i].qidpath == fid->qid.path)
  380. if(dirtab[i].perm&DMEXCL)
  381. inuse[i] = 0;
  382. }
  383. fss = fid->aux;
  384. if(fss == nil)
  385. return;
  386. if(fss->ps)
  387. (*fss->proto->close)(fss);
  388. _freeattr(fss->attr);
  389. free(fss);
  390. }
  391. static int
  392. readlist(int off, int (*gen)(int, char*, uint, Fsstate*), Req *r, Fsstate *fss)
  393. {
  394. char *a, *ea;
  395. int n;
  396. a = r->ofcall.data;
  397. ea = a+r->ifcall.count;
  398. for(;;){
  399. n = (*gen)(off, a, ea-a, fss);
  400. if(n == 0){
  401. r->ofcall.count = a - (char*)r->ofcall.data;
  402. return off;
  403. }
  404. a += n;
  405. off++;
  406. }
  407. }
  408. static int
  409. keylist(int i, char *a, uint n, Fsstate *fss)
  410. {
  411. char buf[512];
  412. Keyinfo ki;
  413. Key *k;
  414. k = nil;
  415. mkkeyinfo(&ki, fss, nil);
  416. ki.attr = nil;
  417. ki.skip = i;
  418. ki.usedisabled = 1;
  419. if(findkey(&k, &ki, "") != RpcOk)
  420. return 0;
  421. snprint(buf, sizeof buf, "key %A %N\n", k->attr, k->privattr);
  422. closekey(k);
  423. strcpy(buf+sizeof buf-2, "\n"); /* if line is really long, just truncate */
  424. if(strlen(buf) > n)
  425. return 0;
  426. n = strlen(buf);
  427. memmove(a, buf, n);
  428. return n;
  429. }
  430. static int
  431. protolist(int i, char *a, uint n, Fsstate *fss)
  432. {
  433. USED(fss);
  434. if(i >= nelem(prototab)-1)
  435. return 0;
  436. if(strlen(prototab[i]->name)+1 > n)
  437. return 0;
  438. n = strlen(prototab[i]->name)+1;
  439. memmove(a, prototab[i]->name, n-1);
  440. a[n-1] = '\n';
  441. return n;
  442. }
  443. static void
  444. fsread(Req *r)
  445. {
  446. Fsstate *s;
  447. s = r->fid->aux;
  448. switch((ulong)r->fid->qid.path){
  449. default:
  450. respond(r, "bug in fsread");
  451. break;
  452. case Qroot:
  453. dirread9p(r, rootdirgen, nil);
  454. respond(r, nil);
  455. break;
  456. case Qfactotum:
  457. dirread9p(r, fsdirgen, nil);
  458. respond(r, nil);
  459. break;
  460. case Qrpc:
  461. rpcread(r);
  462. break;
  463. case Qneedkey:
  464. needkeyread(r);
  465. break;
  466. case Qconfirm:
  467. confirmread(r);
  468. break;
  469. case Qlog:
  470. logread(r);
  471. break;
  472. case Qctl:
  473. s->listoff = readlist(s->listoff, keylist, r, s);
  474. respond(r, nil);
  475. break;
  476. case Qprotolist:
  477. s->listoff = readlist(s->listoff, protolist, r, s);
  478. respond(r, nil);
  479. break;
  480. }
  481. }
  482. static void
  483. fswrite(Req *r)
  484. {
  485. int ret;
  486. char err[ERRMAX], *s;
  487. switch((ulong)r->fid->qid.path){
  488. default:
  489. respond(r, "bug in fswrite");
  490. break;
  491. case Qrpc:
  492. rpcwrite(r);
  493. break;
  494. case Qneedkey:
  495. case Qconfirm:
  496. case Qctl:
  497. s = emalloc(r->ifcall.count+1);
  498. memmove(s, r->ifcall.data, r->ifcall.count);
  499. s[r->ifcall.count] = '\0';
  500. switch((ulong)r->fid->qid.path){
  501. default:
  502. abort();
  503. case Qneedkey:
  504. ret = needkeywrite(s);
  505. break;
  506. case Qconfirm:
  507. ret = confirmwrite(s);
  508. break;
  509. case Qctl:
  510. ret = ctlwrite(s, 0);
  511. break;
  512. }
  513. free(s);
  514. if(ret < 0){
  515. rerrstr(err, sizeof err);
  516. respond(r, err);
  517. }else{
  518. r->ofcall.count = r->ifcall.count;
  519. respond(r, nil);
  520. }
  521. break;
  522. }
  523. }
  524. static void
  525. fsflush(Req *r)
  526. {
  527. confirmflush(r->oldreq);
  528. needkeyflush(r->oldreq);
  529. logflush(r->oldreq);
  530. respond(r, nil);
  531. }
  532. Srv fs = {
  533. .attach= fsattach,
  534. .walk1= fswalk1,
  535. .open= fsopen,
  536. .read= fsread,
  537. .write= fswrite,
  538. .stat= fsstat,
  539. .flush= fsflush,
  540. .destroyfid= fsdestroyfid,
  541. };