/** * \file server/utils.c * * \brief General/Generic functions for the fwknop server. */ /* Fwknop is developed primarily by the people listed in the file 'AUTHORS'. * Copyright (C) 2009-2015 fwknop developers and contributors. For a full * list of contributors, see the file 'CREDITS'. * * License (GNU General Public License): * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 * USA */ #include "fwknopd_common.h" #include "utils.h" #include "log_msg.h" #include "replay_cache.h" #include "config_init.h" #include "fw_util.h" #include "cmd_cycle.h" /* Basic directory/binary checks (stat() and whether the path is actually * a directory or an executable). */ static int is_valid_path(const char *path, const int file_type) { if(strnlen(path, MAX_PATH_LEN) == MAX_PATH_LEN) { log_msg(LOG_ERR, "[-] Provided path is too long"); return(0); } #if HAVE_STAT || HAVE_LSTAT struct stat st; /* If we are unable to stat the given path, then return with error. */ #if HAVE_LSTAT /* prefer lstat() to stat() */ if(lstat(path, &st) != 0) { log_msg(LOG_ERR, "[-] unable to lstat() path: %s: %s", path, strerror(errno)); return(0); } #else if(stat(path, &st) != 0) { log_msg(LOG_ERR, "[-] unable to stat() path: %s: %s", path, strerror(errno)); return(0); } #endif if(file_type == IS_DIR) { if(!S_ISDIR(st.st_mode)) return(0); } else if(file_type == IS_EXE) { if(!S_ISREG(st.st_mode) || ! (st.st_mode & S_IXUSR)) return(0); } else if(file_type == IS_FILE) { if(!S_ISREG(st.st_mode)) return(0); } else return(0); #endif /* HAVE_STAT || HAVE_LSTAT */ return(1); } int is_valid_dir(const char *path) { return is_valid_path(path, IS_DIR); } int is_valid_exe(const char *path) { return is_valid_path(path, IS_EXE); } int is_valid_file(const char *path) { return is_valid_path(path, IS_FILE); } int verify_file_perms_ownership(const char *file, int fd) { #if HAVE_FSTAT struct stat st; /* Every file that fwknopd deals with should be owned * by the user and permissions set to 600 (user read/write) */ if(fstat(fd, &st) == 0) { /* Make sure it is a regular file */ if(S_ISREG(st.st_mode) != 1 && S_ISLNK(st.st_mode) != 1) { log_msg(LOG_WARNING, "[-] file: %s is not a regular file or symbolic link.", file ); return 0; } if((st.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO)) != (S_IRUSR|S_IWUSR)) { log_msg(LOG_WARNING, "[-] file: %s permissions should only be user read/write (0600, -rw-------)", file ); /* when we start in enforcing this instead of just warning * the user res = 0; */ } if(st.st_uid != getuid()) { log_msg(LOG_WARNING, "[-] file: %s not owned by current effective user id", file); /* when we start in enforcing this instead of just warning * the user res = 0; */ } } else { /* if the path doesn't exist, just return, but otherwise something * went wrong */ if(errno != ENOENT) { log_msg(LOG_ERR, "[-] stat() against file: %s returned: %s", file, strerror(errno)); return 0; } } #endif return 1; } void truncate_partial_line(char *str) { int i, have_newline=0; if(str != NULL && str[0] != 0x0) { for (i=0; i < strlen(str); i++) { if(str[i] == 0x0a) { have_newline = 1; break; } } /* Don't zero out any data unless there is at least * one newline */ if(have_newline) { for (i=strlen(str)-1; i > 0; i--) { if(str[i] == 0x0a) break; str[i] = 0x0; } } } return; } /* Simple test to see if a string only contains digits */ int is_digits(const char * const str) { int i; if (str != NULL && str[0] != 0x0) { for (i=0; iconfig[CONF_FAULT_INJECTION_TAG] != NULL) { fiu_disable(opts->config[CONF_FAULT_INJECTION_TAG]); } #endif if(!opts->test && opts->enable_fw && (fw_cleanup_flag == FW_CLEANUP)) fw_cleanup(opts); #if USE_FILE_CACHE free_replay_list(opts); #endif free_logging(); free_cmd_cycle_list(opts); free_configs(opts); exit(exit_status); } /***EOF***/