2 1e84c7b7 2022-01-10 op * Copyright (c) 2021, 2022 Omar Polo <op@omarpolo.com>
3 fb1a36c0 2022-01-09 op * Copyright (c) 2018 Florian Obser <florian@openbsd.org>
4 fb1a36c0 2022-01-09 op * Copyright (c) 2004, 2005 Claudio Jeker <claudio@openbsd.org>
5 fb1a36c0 2022-01-09 op * Copyright (c) 2004 Esben Norby <norby@openbsd.org>
6 fb1a36c0 2022-01-09 op * Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org>
8 fb1a36c0 2022-01-09 op * Permission to use, copy, modify, and distribute this software for any
9 fb1a36c0 2022-01-09 op * purpose with or without fee is hereby granted, provided that the above
10 fb1a36c0 2022-01-09 op * copyright notice and this permission notice appear in all copies.
12 fb1a36c0 2022-01-09 op * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
13 fb1a36c0 2022-01-09 op * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
14 fb1a36c0 2022-01-09 op * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
15 fb1a36c0 2022-01-09 op * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
16 fb1a36c0 2022-01-09 op * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 fb1a36c0 2022-01-09 op * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
18 fb1a36c0 2022-01-09 op * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
21 bbcba3ed 2022-01-10 op #include "compat.h"
23 fb1a36c0 2022-01-09 op #include <sys/socket.h>
24 fb1a36c0 2022-01-09 op #include <sys/types.h>
25 fb1a36c0 2022-01-09 op #include <sys/uio.h>
27 fb1a36c0 2022-01-09 op #include <endian.h>
28 fb1a36c0 2022-01-09 op #include <errno.h>
29 fb1a36c0 2022-01-09 op #include <inttypes.h>
30 fb1a36c0 2022-01-09 op #include <pwd.h>
31 fb1a36c0 2022-01-09 op #include <signal.h>
32 fb1a36c0 2022-01-09 op #include <stdint.h>
33 fb1a36c0 2022-01-09 op #include <stdio.h>
34 fb1a36c0 2022-01-09 op #include <stdlib.h>
35 fb1a36c0 2022-01-09 op #include <string.h>
36 fb1a36c0 2022-01-09 op #include <syslog.h>
37 fb1a36c0 2022-01-09 op #include <unistd.h>
39 fb1a36c0 2022-01-09 op #include "control.h"
40 fb1a36c0 2022-01-09 op #include "kami.h"
41 fb1a36c0 2022-01-09 op #include "kamid.h"
42 fb1a36c0 2022-01-09 op #include "listener.h"
43 fb1a36c0 2022-01-09 op #include "log.h"
44 fb1a36c0 2022-01-09 op #include "sandbox.h"
45 fb1a36c0 2022-01-09 op #include "utils.h"
47 fb1a36c0 2022-01-09 op static struct kd_conf *listener_conf;
48 fb1a36c0 2022-01-09 op static struct imsgev *iev_main;
50 fb1a36c0 2022-01-09 op static void listener_sig_handler(int, short, void *);
51 fb1a36c0 2022-01-09 op __dead void listener_shutdown(void);
53 fb1a36c0 2022-01-09 op SPLAY_HEAD(clients_tree_id, client) clients;
55 fb1a36c0 2022-01-09 op struct client {
58 fb1a36c0 2022-01-09 op uint32_t msize;
61 fb1a36c0 2022-01-09 op struct tls *ctx;
62 fb1a36c0 2022-01-09 op struct event event;
63 fb1a36c0 2022-01-09 op struct imsgev iev;
64 fb1a36c0 2022-01-09 op struct bufferevent *bev;
65 fb1a36c0 2022-01-09 op SPLAY_ENTRY(client) sp_entry;
68 fb1a36c0 2022-01-09 op static void listener_imsg_event_add(struct imsgev *, void *);
69 fb1a36c0 2022-01-09 op static void listener_dispatch_client(int, short, void *);
70 fb1a36c0 2022-01-09 op static int listener_imsg_compose_client(struct client *, int,
71 fb1a36c0 2022-01-09 op uint32_t, const void *, uint16_t);
73 fb1a36c0 2022-01-09 op static void apply_config(struct kd_conf *);
74 fb1a36c0 2022-01-09 op static void handle_accept(int, short, void *);
76 fb1a36c0 2022-01-09 op static void handle_handshake(int, short, void *);
77 fb1a36c0 2022-01-09 op static void client_read(struct bufferevent *, void *);
78 fb1a36c0 2022-01-09 op static void client_write(struct bufferevent *, void *);
79 fb1a36c0 2022-01-09 op static void client_error(struct bufferevent *, short, void *);
80 fb1a36c0 2022-01-09 op static void client_tls_readcb(int, short, void *);
81 fb1a36c0 2022-01-09 op static void client_tls_writecb(int, short, void *);
82 fb1a36c0 2022-01-09 op static void close_conn(struct client *);
83 fb1a36c0 2022-01-09 op static void handle_close(int, short, void *);
85 fb1a36c0 2022-01-09 op static inline int
86 fb1a36c0 2022-01-09 op clients_tree_cmp(struct client *a, struct client *b)
88 fb1a36c0 2022-01-09 op if (a->id == b->id)
90 fb1a36c0 2022-01-09 op else if (a->id < b->id)
96 fb1a36c0 2022-01-09 op SPLAY_PROTOTYPE(clients_tree_id, client, sp_entry, clients_tree_cmp);
97 fb1a36c0 2022-01-09 op SPLAY_GENERATE(clients_tree_id, client, sp_entry, clients_tree_cmp)
100 fb1a36c0 2022-01-09 op listener_sig_handler(int sig, short event, void *d)
103 fb1a36c0 2022-01-09 op * Normal signal handler rules don't apply because libevent
104 fb1a36c0 2022-01-09 op * decouples for us.
107 fb1a36c0 2022-01-09 op switch (sig) {
109 fb1a36c0 2022-01-09 op case SIGTERM:
110 fb1a36c0 2022-01-09 op listener_shutdown();
112 fb1a36c0 2022-01-09 op fatalx("unexpected signal %d", sig);
117 fb1a36c0 2022-01-09 op listener(int debug, int verbose)
119 fb1a36c0 2022-01-09 op struct event ev_sigint, ev_sigterm;
120 fb1a36c0 2022-01-09 op struct passwd *pw;
122 fb1a36c0 2022-01-09 op /* listener_conf = config_new_empty(); */
124 fb1a36c0 2022-01-09 op log_init(debug, LOG_DAEMON);
125 fb1a36c0 2022-01-09 op log_setverbose(verbose);
127 fb1a36c0 2022-01-09 op if ((pw = getpwnam(KD_USER)) == NULL)
128 fb1a36c0 2022-01-09 op fatal("getpwnam");
130 fb1a36c0 2022-01-09 op if (chroot(pw->pw_dir) == -1)
131 fb1a36c0 2022-01-09 op fatal("chroot");
132 fb1a36c0 2022-01-09 op if (chdir("/") == -1)
133 fb1a36c0 2022-01-09 op fatal("chdir(\"/\")");
135 fb1a36c0 2022-01-09 op setproctitle("listener");
136 fb1a36c0 2022-01-09 op log_procinit("listener");
138 fb1a36c0 2022-01-09 op if (setgroups(1, &pw->pw_gid) ||
139 fb1a36c0 2022-01-09 op setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) ||
140 fb1a36c0 2022-01-09 op setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid))
141 fb1a36c0 2022-01-09 op fatal("can't drop privileges");
143 fb1a36c0 2022-01-09 op event_init();
145 fb1a36c0 2022-01-09 op /* Setup signal handlers(s). */
146 fb1a36c0 2022-01-09 op signal_set(&ev_sigint, SIGINT, listener_sig_handler, NULL);
147 fb1a36c0 2022-01-09 op signal_set(&ev_sigterm, SIGTERM, listener_sig_handler, NULL);
149 fb1a36c0 2022-01-09 op signal_add(&ev_sigint, NULL);
150 fb1a36c0 2022-01-09 op signal_add(&ev_sigterm, NULL);
152 fb1a36c0 2022-01-09 op signal(SIGPIPE, SIG_IGN);
153 fb1a36c0 2022-01-09 op signal(SIGHUP, SIG_IGN);
155 fb1a36c0 2022-01-09 op /* Setup pipe and event handler to the main process. */
156 fb1a36c0 2022-01-09 op if ((iev_main = malloc(sizeof(*iev_main))) == NULL)
159 fb1a36c0 2022-01-09 op imsg_init(&iev_main->ibuf, 3);
160 fb1a36c0 2022-01-09 op iev_main->handler = listener_dispatch_main;
162 fb1a36c0 2022-01-09 op /* Setup event handlers. */
163 fb1a36c0 2022-01-09 op iev_main->events = EV_READ;
164 fb1a36c0 2022-01-09 op event_set(&iev_main->ev, iev_main->ibuf.fd, iev_main->events,
165 fb1a36c0 2022-01-09 op iev_main->handler, iev_main);
166 fb1a36c0 2022-01-09 op event_add(&iev_main->ev, NULL);
168 fb1a36c0 2022-01-09 op sandbox_listener();
169 fb1a36c0 2022-01-09 op event_dispatch();
170 fb1a36c0 2022-01-09 op listener_shutdown();
174 fb1a36c0 2022-01-09 op listener_shutdown(void)
176 fb1a36c0 2022-01-09 op msgbuf_clear(&iev_main->ibuf.w);
177 fb1a36c0 2022-01-09 op close(iev_main->ibuf.fd);
179 ef9db8f6 2022-01-28 op clear_config(listener_conf);
181 fb1a36c0 2022-01-09 op free(iev_main);
183 fb1a36c0 2022-01-09 op log_info("listener exiting");
188 fb1a36c0 2022-01-09 op listener_receive_config(struct imsg *imsg, struct kd_conf **nconf,
189 fb1a36c0 2022-01-09 op struct kd_pki_conf **pki)
191 fb1a36c0 2022-01-09 op struct kd_listen_conf *listen;
194 fb1a36c0 2022-01-09 op switch (imsg->hdr.type) {
195 fb1a36c0 2022-01-09 op case IMSG_RECONF_CONF:
196 fb1a36c0 2022-01-09 op if (*nconf != NULL)
197 fb1a36c0 2022-01-09 op fatalx("%s: IMSG_RECONF_CONF already in "
198 fb1a36c0 2022-01-09 op "progress", __func__);
200 fb1a36c0 2022-01-09 op if (listener_conf != NULL)
201 fb1a36c0 2022-01-09 op fatalx("%s: don't know how reload the "
202 fb1a36c0 2022-01-09 op "configuration yet", __func__);
204 fb1a36c0 2022-01-09 op if (IMSG_DATA_SIZE(*imsg) != sizeof(struct kd_conf))
205 fb1a36c0 2022-01-09 op fatalx("%s: IMSG_RECONF_CONF wrong length: %lu",
206 fb1a36c0 2022-01-09 op __func__, IMSG_DATA_SIZE(*imsg));
207 fb1a36c0 2022-01-09 op if ((*nconf = malloc(sizeof(**nconf))) == NULL)
209 fb1a36c0 2022-01-09 op memcpy(*nconf, imsg->data, sizeof(**nconf));
210 d70ef554 2022-01-28 op STAILQ_INIT(&(*nconf)->pki_head);
211 d70ef554 2022-01-28 op STAILQ_INIT(&(*nconf)->table_head);
212 d70ef554 2022-01-28 op STAILQ_INIT(&(*nconf)->listen_head);
214 fb1a36c0 2022-01-09 op case IMSG_RECONF_PKI:
215 fb1a36c0 2022-01-09 op if (*nconf == NULL)
216 fb1a36c0 2022-01-09 op fatalx("%s: IMSG_RECONF_PKI without "
217 fb1a36c0 2022-01-09 op "IMSG_RECONF_CONF", __func__);
218 fb1a36c0 2022-01-09 op *pki = xcalloc(1, sizeof(**pki));
219 fb1a36c0 2022-01-09 op t = imsg->data;
220 fb1a36c0 2022-01-09 op t[IMSG_DATA_SIZE(*imsg)-1] = '\0';
221 fb1a36c0 2022-01-09 op strlcpy((*pki)->name, t, sizeof((*pki)->name));
223 fb1a36c0 2022-01-09 op case IMSG_RECONF_PKI_CERT:
224 fb1a36c0 2022-01-09 op if (*pki == NULL)
225 fb1a36c0 2022-01-09 op fatalx("%s: IMSG_RECONF_PKI_CERT without "
226 fb1a36c0 2022-01-09 op "IMSG_RECONF_PKI", __func__);
227 fb1a36c0 2022-01-09 op (*pki)->certlen = IMSG_DATA_SIZE(*imsg);
228 fb1a36c0 2022-01-09 op (*pki)->cert = xmemdup(imsg->data, (*pki)->certlen);
230 fb1a36c0 2022-01-09 op case IMSG_RECONF_PKI_KEY:
231 fb1a36c0 2022-01-09 op if (*pki == NULL)
232 fb1a36c0 2022-01-09 op fatalx("%s: IMSG_RECONF_PKI_KEY without "
233 fb1a36c0 2022-01-09 op "IMSG_RECONF_PKI", __func__);
234 fb1a36c0 2022-01-09 op (*pki)->keylen = IMSG_DATA_SIZE(*imsg);
235 fb1a36c0 2022-01-09 op (*pki)->key = xmemdup(imsg->data, (*pki)->keylen);
236 fb1a36c0 2022-01-09 op STAILQ_INSERT_HEAD(&(*nconf)->pki_head, *pki, entry);
239 fb1a36c0 2022-01-09 op case IMSG_RECONF_LISTEN:
240 fb1a36c0 2022-01-09 op if (*nconf == NULL)
241 fb1a36c0 2022-01-09 op fatalx("%s: IMSG_RECONF_LISTEN without "
242 fb1a36c0 2022-01-09 op "IMSG_RECONF_CONF", __func__);
243 fb1a36c0 2022-01-09 op if (IMSG_DATA_SIZE(*imsg) != sizeof(*listen))
244 fb1a36c0 2022-01-09 op fatalx("%s: IMSG_RECONF_LISTEN wrong length: %lu",
245 fb1a36c0 2022-01-09 op __func__, IMSG_DATA_SIZE(*imsg));
246 fb1a36c0 2022-01-09 op listen = xcalloc(1, sizeof(*listen));
247 fb1a36c0 2022-01-09 op memcpy(listen, imsg->data, sizeof(*listen));
248 fb1a36c0 2022-01-09 op memset(&listen->entry, 0, sizeof(listen->entry));
249 fb1a36c0 2022-01-09 op if ((listen->fd = imsg->fd) == -1)
250 fb1a36c0 2022-01-09 op fatalx("%s: IMSG_RECONF_LISTEN no fd",
252 fb1a36c0 2022-01-09 op listen->auth_table = NULL;
253 fb1a36c0 2022-01-09 op memset(&listen->ev, 0, sizeof(listen->ev));
254 fb1a36c0 2022-01-09 op STAILQ_INSERT_HEAD(&(*nconf)->listen_head, listen, entry);
256 fb1a36c0 2022-01-09 op case IMSG_RECONF_END:
257 fb1a36c0 2022-01-09 op if (*nconf == NULL)
258 fb1a36c0 2022-01-09 op fatalx("%s: IMSG_RECONF_END without "
259 fb1a36c0 2022-01-09 op "IMSG_RECONF_CONF", __func__);
260 fb1a36c0 2022-01-09 op apply_config(*nconf);
261 fb1a36c0 2022-01-09 op *nconf = NULL;
266 fb1a36c0 2022-01-09 op static inline struct kd_listen_conf *
267 fb1a36c0 2022-01-09 op listen_by_id(uint32_t id)
269 fb1a36c0 2022-01-09 op struct kd_listen_conf *l;
271 fb1a36c0 2022-01-09 op STAILQ_FOREACH(l, &listener_conf->listen_head, entry) {
272 fb1a36c0 2022-01-09 op if (l->id == id)
279 fb1a36c0 2022-01-09 op listener_dispatch_main(int fd, short event, void *d)
281 fb1a36c0 2022-01-09 op static struct kd_conf *nconf;
282 fb1a36c0 2022-01-09 op static struct kd_pki_conf *pki;
283 fb1a36c0 2022-01-09 op struct kd_listen_conf *listen;
284 fb1a36c0 2022-01-09 op struct client *client, find;
285 fb1a36c0 2022-01-09 op struct imsg imsg;
286 fb1a36c0 2022-01-09 op struct imsgev *iev = d;
287 fb1a36c0 2022-01-09 op struct imsgbuf *ibuf;
289 fb1a36c0 2022-01-09 op int shut = 0;
291 fb1a36c0 2022-01-09 op ibuf = &iev->ibuf;
293 fb1a36c0 2022-01-09 op if (event & EV_READ) {
294 fb1a36c0 2022-01-09 op if ((n = imsg_read(ibuf)) == -1 && errno != EAGAIN)
295 fb1a36c0 2022-01-09 op fatal("imsg_read error");
296 fb1a36c0 2022-01-09 op if (n == 0) /* Connection closed. */
299 fb1a36c0 2022-01-09 op if (event & EV_WRITE) {
300 fb1a36c0 2022-01-09 op if ((n = msgbuf_write(&ibuf->w)) == -1 && errno != EAGAIN)
301 fb1a36c0 2022-01-09 op fatal("msgbuf_write");
302 fb1a36c0 2022-01-09 op if (n == 0) /* Connection closed. */
307 fb1a36c0 2022-01-09 op if ((n = imsg_get(ibuf, &imsg)) == -1)
308 fb1a36c0 2022-01-09 op fatal("%s: imsg_get error", __func__);
309 fb1a36c0 2022-01-09 op if (n == 0) /* No more messages. */
312 fb1a36c0 2022-01-09 op switch (imsg.hdr.type) {
313 982f38dc 2022-01-23 op case IMSG_CTL_LOG_VERBOSE:
314 982f38dc 2022-01-23 op if (IMSG_DATA_SIZE(imsg) != sizeof(verbose))
315 982f38dc 2022-01-23 op fatalx("wrong size for IMSG_CTL_LOG_VERBOSE");
316 982f38dc 2022-01-23 op memcpy(&verbose, imsg.data, sizeof(verbose));
317 982f38dc 2022-01-23 op log_setverbose(verbose);
318 982f38dc 2022-01-23 op SPLAY_FOREACH(client, clients_tree_id, &clients)
319 982f38dc 2022-01-23 op listener_imsg_compose_client(client,
320 982f38dc 2022-01-23 op imsg.hdr.type, 0,
321 982f38dc 2022-01-23 op &verbose, sizeof(verbose));
323 fb1a36c0 2022-01-09 op case IMSG_RECONF_CONF:
324 fb1a36c0 2022-01-09 op case IMSG_RECONF_PKI:
325 fb1a36c0 2022-01-09 op case IMSG_RECONF_PKI_CERT:
326 fb1a36c0 2022-01-09 op case IMSG_RECONF_PKI_KEY:
327 fb1a36c0 2022-01-09 op case IMSG_RECONF_LISTEN:
328 fb1a36c0 2022-01-09 op case IMSG_RECONF_END:
329 fb1a36c0 2022-01-09 op listener_receive_config(&imsg, &nconf, &pki);
331 fb1a36c0 2022-01-09 op case IMSG_AUTH:
332 1e84c7b7 2022-01-10 op if (IMSG_DATA_SIZE(imsg) != sizeof(struct kd_auth_proc))
333 1e84c7b7 2022-01-10 op fatalx("mismatching size for IMSG_AUTH");
335 fb1a36c0 2022-01-09 op find.id = imsg.hdr.peerid;
336 fb1a36c0 2022-01-09 op client = SPLAY_FIND(clients_tree_id, &clients, &find);
337 fb1a36c0 2022-01-09 op if (client == NULL) {
338 fb1a36c0 2022-01-09 op if (imsg.fd != -1)
339 fb1a36c0 2022-01-09 op close(imsg.fd);
342 fb1a36c0 2022-01-09 op if (imsg.fd == -1) {
343 fb1a36c0 2022-01-09 op log_info("got fd = -1, auth failed?");
344 fb1a36c0 2022-01-09 op close_conn(client);
347 fb1a36c0 2022-01-09 op imsg_init(&client->iev.ibuf, imsg.fd);
348 fb1a36c0 2022-01-09 op client->iev.events = EV_READ;
349 fb1a36c0 2022-01-09 op client->iev.handler = listener_dispatch_client;
350 fb1a36c0 2022-01-09 op event_set(&client->iev.ev, client->iev.ibuf.fd,
351 fb1a36c0 2022-01-09 op client->iev.events, client->iev.handler, client);
352 fb1a36c0 2022-01-09 op listener_imsg_compose_client(client, IMSG_AUTH,
353 fb1a36c0 2022-01-09 op client->id, imsg.data, IMSG_DATA_SIZE(imsg));
355 fb1a36c0 2022-01-09 op client->bev = bufferevent_new(client->fd,
356 fb1a36c0 2022-01-09 op client_read, client_write, client_error,
358 fb1a36c0 2022-01-09 op if (client->bev == NULL) {
359 fb1a36c0 2022-01-09 op log_info("failed to allocate client buffer");
360 fb1a36c0 2022-01-09 op close_conn(client);
364 fb1a36c0 2022-01-09 op #if HAVE_EVENT2
365 fb1a36c0 2022-01-09 op evbuffer_unfreeze(client->bev->input, 0);
366 fb1a36c0 2022-01-09 op evbuffer_unfreeze(client->bev->output, 1);
369 fb1a36c0 2022-01-09 op listen = listen_by_id(client->lid);
370 fb1a36c0 2022-01-09 op if (listen->flags & L_TLS) {
371 fb1a36c0 2022-01-09 op event_set(&client->bev->ev_read, client->fd,
372 fb1a36c0 2022-01-09 op EV_READ, client_tls_readcb, client->bev);
373 fb1a36c0 2022-01-09 op event_set(&client->bev->ev_write, client->fd,
374 fb1a36c0 2022-01-09 op EV_WRITE, client_tls_writecb, client->bev);
378 fb1a36c0 2022-01-09 op * Read or write at least a header before
379 fb1a36c0 2022-01-09 op * firing the callbacks. High watermark of 0
380 fb1a36c0 2022-01-09 op * to never stop reading/writing; probably to
381 fb1a36c0 2022-01-09 op * be revisited.
383 fb1a36c0 2022-01-09 op /* bufferevent_setwatermark(client->bev, EV_READ|EV_WRITE, */
384 fb1a36c0 2022-01-09 op /* sizeof(struct np_msg_header), 0); */
385 fb1a36c0 2022-01-09 op bufferevent_enable(client->bev, EV_READ|EV_WRITE);
389 fb1a36c0 2022-01-09 op log_debug("%s: unexpected imsg %d", __func__,
390 fb1a36c0 2022-01-09 op imsg.hdr.type);
393 fb1a36c0 2022-01-09 op imsg_free(&imsg);
397 fb1a36c0 2022-01-09 op listener_imsg_event_add(iev, d);
399 fb1a36c0 2022-01-09 op /* This pipe is dead. Remove its event handler. */
400 fb1a36c0 2022-01-09 op event_del(&iev->ev);
401 fb1a36c0 2022-01-09 op log_warnx("pipe closed, shutting down...");
402 fb1a36c0 2022-01-09 op event_loopexit(NULL);
407 fb1a36c0 2022-01-09 op listener_imsg_compose_main(int type, uint32_t peerid, const void *data,
408 fb1a36c0 2022-01-09 op uint16_t datalen)
410 fb1a36c0 2022-01-09 op return imsg_compose_event(iev_main, type, peerid, 0, -1, data,
415 fb1a36c0 2022-01-09 op listener_imsg_event_add(struct imsgev *iev, void *d)
417 fb1a36c0 2022-01-09 op iev->events = EV_READ;
418 fb1a36c0 2022-01-09 op if (iev->ibuf.w.queued)
419 fb1a36c0 2022-01-09 op iev->events |= EV_WRITE;
421 fb1a36c0 2022-01-09 op event_del(&iev->ev);
422 fb1a36c0 2022-01-09 op event_set(&iev->ev, iev->ibuf.fd, iev->events, iev->handler, d);
423 fb1a36c0 2022-01-09 op event_add(&iev->ev, NULL);
427 fb1a36c0 2022-01-09 op listener_dispatch_client(int fd, short event, void *d)
429 fb1a36c0 2022-01-09 op struct client find, *client = d;
430 fb1a36c0 2022-01-09 op struct imsg imsg;
431 fb1a36c0 2022-01-09 op struct imsgev *iev;
432 fb1a36c0 2022-01-09 op struct imsgbuf *ibuf;
434 fb1a36c0 2022-01-09 op int r, shut = 0;
436 fb1a36c0 2022-01-09 op iev = &client->iev;
437 fb1a36c0 2022-01-09 op ibuf = &iev->ibuf;
439 fb1a36c0 2022-01-09 op if (event & EV_READ) {
440 fb1a36c0 2022-01-09 op if ((n = imsg_read(ibuf)) == -1 && errno != EAGAIN)
441 fb1a36c0 2022-01-09 op fatal("imsg_read error");
442 fb1a36c0 2022-01-09 op if (n == 0) /* Connection closed */
446 fb1a36c0 2022-01-09 op if (event & EV_WRITE) {
447 fb1a36c0 2022-01-09 op if ((n = msgbuf_write(&ibuf->w)) == -1 && errno != EAGAIN)
448 fb1a36c0 2022-01-09 op fatal("msgbuf_write");
449 fb1a36c0 2022-01-09 op if (n == 0) /* Connection closed. */
454 fb1a36c0 2022-01-09 op if ((n = imsg_get(ibuf, &imsg)) == -1)
455 fb1a36c0 2022-01-09 op fatal("%s: imsg_get error", __func__);
456 fb1a36c0 2022-01-09 op if (n == 0) /* No more messages. */
459 fb1a36c0 2022-01-09 op switch (imsg.hdr.type) {
460 fb1a36c0 2022-01-09 op case IMSG_BUF:
461 fb1a36c0 2022-01-09 op find.id = imsg.hdr.peerid;
462 fb1a36c0 2022-01-09 op client = SPLAY_FIND(clients_tree_id, &clients, &find);
463 fb1a36c0 2022-01-09 op if (client == NULL) {
464 fb1a36c0 2022-01-09 op log_info("got IMSG_BUF but client (%d) gone",
465 fb1a36c0 2022-01-09 op imsg.hdr.peerid);
468 fb1a36c0 2022-01-09 op r = bufferevent_write(client->bev, imsg.data,
469 fb1a36c0 2022-01-09 op IMSG_DATA_SIZE(imsg));
470 fb1a36c0 2022-01-09 op if (r == -1) {
471 fb1a36c0 2022-01-09 op log_warn("%s: bufferevent_write failed",
473 fb1a36c0 2022-01-09 op close_conn(client);
478 fb1a36c0 2022-01-09 op case IMSG_MSIZE:
479 fb1a36c0 2022-01-09 op if (IMSG_DATA_SIZE(imsg) != sizeof(client->msize))
480 fb1a36c0 2022-01-09 op fatal("IMSG_MSIZE size mismatch: "
481 fb1a36c0 2022-01-09 op "got %zu want %zu", IMSG_DATA_SIZE(imsg),
482 fb1a36c0 2022-01-09 op sizeof(client->msize));
484 fb1a36c0 2022-01-09 op memcpy(&client->msize, imsg.data,
485 fb1a36c0 2022-01-09 op sizeof(client->msize));
487 fb1a36c0 2022-01-09 op if (client->msize == 0)
488 fb1a36c0 2022-01-09 op fatal("IMSG_MSIZE got msize = 0");
492 fb1a36c0 2022-01-09 op case IMSG_CLOSE:
494 fb1a36c0 2022-01-09 op * Both EVBUFFER_READ or EVBUFFER_WRITE should
497 fb1a36c0 2022-01-09 op client_error(client->bev, EVBUFFER_READ, client);
501 fb1a36c0 2022-01-09 op log_debug("%s: unexpected imsg %d", __func__,
502 fb1a36c0 2022-01-09 op imsg.hdr.type);
505 fb1a36c0 2022-01-09 op imsg_free(&imsg);
509 fb1a36c0 2022-01-09 op listener_imsg_event_add(iev, d);
511 fb1a36c0 2022-01-09 op /* This pipe is dead. Remove its handler */
512 fb1a36c0 2022-01-09 op log_debug("client proc vanished");
513 fb1a36c0 2022-01-09 op close_conn(client);
518 fb1a36c0 2022-01-09 op listener_imsg_compose_client(struct client *client, int type,
519 fb1a36c0 2022-01-09 op uint32_t peerid, const void *data, uint16_t len)
523 fb1a36c0 2022-01-09 op if ((ret = imsg_compose(&client->iev.ibuf, type, peerid, 0, -1,
524 fb1a36c0 2022-01-09 op data, len)) != -1)
525 fb1a36c0 2022-01-09 op listener_imsg_event_add(&client->iev, client);
530 fb1a36c0 2022-01-09 op static inline struct kd_pki_conf *
531 fb1a36c0 2022-01-09 op pki_by_name(const char *name)
533 fb1a36c0 2022-01-09 op struct kd_pki_conf *pki;
535 fb1a36c0 2022-01-09 op STAILQ_FOREACH(pki, &listener_conf->pki_head, entry) {
536 fb1a36c0 2022-01-09 op if (!strcmp(name, pki->name))
544 fb1a36c0 2022-01-09 op apply_config(struct kd_conf *conf)
546 fb1a36c0 2022-01-09 op struct kd_pki_conf *pki;
547 fb1a36c0 2022-01-09 op struct kd_listen_conf *listen;
549 4c0ae0c3 2022-01-28 op /* swap the now config with the current one */
550 4c0ae0c3 2022-01-28 op clear_config(listener_conf);
551 fb1a36c0 2022-01-09 op listener_conf = conf;
553 fb1a36c0 2022-01-09 op /* prepare the various tls_config */
554 fb1a36c0 2022-01-09 op STAILQ_FOREACH(pki, &listener_conf->pki_head, entry) {
555 fb1a36c0 2022-01-09 op if ((pki->tlsconf = tls_config_new()) == NULL)
556 fb1a36c0 2022-01-09 op fatal("tls_config_new");
557 fb1a36c0 2022-01-09 op tls_config_verify_client_optional(pki->tlsconf);
558 fb1a36c0 2022-01-09 op tls_config_insecure_noverifycert(pki->tlsconf);
559 fb1a36c0 2022-01-09 op if (tls_config_set_keypair_mem(pki->tlsconf,
560 fb1a36c0 2022-01-09 op pki->cert, pki->certlen,
561 fb1a36c0 2022-01-09 op pki->key, pki->keylen) == -1)
562 fb1a36c0 2022-01-09 op fatalx("tls_config_set_keypair_mem: %s",
563 fb1a36c0 2022-01-09 op tls_config_error(pki->tlsconf));
566 fb1a36c0 2022-01-09 op /* prepare and kickoff the listeners */
567 fb1a36c0 2022-01-09 op STAILQ_FOREACH(listen, &listener_conf->listen_head, entry) {
568 fb1a36c0 2022-01-09 op if ((listen->ctx = tls_server()) == NULL)
569 fb1a36c0 2022-01-09 op fatal("tls_server");
571 fb1a36c0 2022-01-09 op pki = pki_by_name(listen->pki);
572 fb1a36c0 2022-01-09 op if (tls_configure(listen->ctx, pki->tlsconf) == -1)
573 fb1a36c0 2022-01-09 op fatalx("tls_configure: %s",
574 fb1a36c0 2022-01-09 op tls_config_error(pki->tlsconf));
576 fb1a36c0 2022-01-09 op event_set(&listen->ev, listen->fd, EV_READ|EV_PERSIST,
577 fb1a36c0 2022-01-09 op handle_accept, listen);
578 fb1a36c0 2022-01-09 op event_add(&listen->ev, NULL);
582 fb1a36c0 2022-01-09 op static inline void
583 fb1a36c0 2022-01-09 op yield_r(struct client *c, void (*fn)(int, short, void *))
585 fb1a36c0 2022-01-09 op if (event_pending(&c->event, EV_WRITE|EV_READ, NULL))
586 fb1a36c0 2022-01-09 op event_del(&c->event);
587 fb1a36c0 2022-01-09 op event_set(&c->event, c->fd, EV_READ, fn, c);
588 fb1a36c0 2022-01-09 op event_add(&c->event, NULL);
591 fb1a36c0 2022-01-09 op static inline void
592 fb1a36c0 2022-01-09 op yield_w(struct client *c, void (*fn)(int, short, void *))
594 fb1a36c0 2022-01-09 op if (event_pending(&c->event, EV_WRITE|EV_READ, NULL))
595 fb1a36c0 2022-01-09 op event_del(&c->event);
596 fb1a36c0 2022-01-09 op event_set(&c->event, c->fd, EV_WRITE, fn, c);
597 fb1a36c0 2022-01-09 op event_add(&c->event, NULL);
601 fb1a36c0 2022-01-09 op handle_accept(int fd, short ev, void *data)
603 057b5ab7 2022-01-28 op static uint32_t counter;
604 fb1a36c0 2022-01-09 op struct kd_listen_conf *listen = data;
605 fb1a36c0 2022-01-09 op struct client *c;
608 fb1a36c0 2022-01-09 op if ((s = accept(fd, NULL, NULL)) == -1) {
609 fb1a36c0 2022-01-09 op log_warn("accept");
613 fb1a36c0 2022-01-09 op c = xcalloc(1, sizeof(*c));
614 fb1a36c0 2022-01-09 op c->msize = MSIZE9P;
615 fb1a36c0 2022-01-09 op c->lid = listen->id;
616 fb1a36c0 2022-01-09 op c->iev.ibuf.fd = -1;
618 fb1a36c0 2022-01-09 op if (tls_accept_socket(listen->ctx, &c->ctx, s) == -1) {
619 fb1a36c0 2022-01-09 op log_warnx("tls_accept_socket: %s",
620 fb1a36c0 2022-01-09 op tls_error(listen->ctx));
627 057b5ab7 2022-01-28 op c->id = counter++;
629 fb1a36c0 2022-01-09 op SPLAY_INSERT(clients_tree_id, &clients, c);
631 fb1a36c0 2022-01-09 op /* initialize the event */
632 fb1a36c0 2022-01-09 op event_set(&c->event, c->fd, EV_READ, NULL, NULL);
634 fb1a36c0 2022-01-09 op yield_r(c, handle_handshake);
638 fb1a36c0 2022-01-09 op handle_handshake(int fd, short ev, void *data)
640 fb1a36c0 2022-01-09 op struct client *c = data;
641 fb1a36c0 2022-01-09 op struct kd_auth_req auth;
643 fb1a36c0 2022-01-09 op const char *hash;
645 fb1a36c0 2022-01-09 op switch (r = tls_handshake(c->ctx)) {
646 fb1a36c0 2022-01-09 op case TLS_WANT_POLLIN:
647 fb1a36c0 2022-01-09 op yield_r(c, handle_handshake);
649 fb1a36c0 2022-01-09 op case TLS_WANT_POLLOUT:
650 fb1a36c0 2022-01-09 op yield_w(c, handle_handshake);
653 fb1a36c0 2022-01-09 op log_debug("handhsake failed: %s", tls_error(c->ctx));
654 fb1a36c0 2022-01-09 op close_conn(c);
658 fb1a36c0 2022-01-09 op if ((hash = tls_peer_cert_hash(c->ctx)) == NULL) {
659 fb1a36c0 2022-01-09 op log_warnx("client didn't provide certificate");
660 fb1a36c0 2022-01-09 op close_conn(c);
664 fb1a36c0 2022-01-09 op memset(&auth, 0, sizeof(auth));
665 fb1a36c0 2022-01-09 op auth.listen_id = c->lid;
666 fb1a36c0 2022-01-09 op strlcpy(auth.hash, hash, sizeof(auth.hash));
667 fb1a36c0 2022-01-09 op log_debug("sending hash %s", auth.hash);
669 fb1a36c0 2022-01-09 op listener_imsg_compose_main(IMSG_AUTH_TLS, c->id,
670 fb1a36c0 2022-01-09 op &auth, sizeof(auth));
674 fb1a36c0 2022-01-09 op client_read(struct bufferevent *bev, void *d)
676 fb1a36c0 2022-01-09 op struct client *client = d;
677 fb1a36c0 2022-01-09 op struct evbuffer *src = EVBUFFER_INPUT(bev);
678 fb1a36c0 2022-01-09 op uint32_t len;
681 fb1a36c0 2022-01-09 op if (EVBUFFER_LENGTH(src) < 4)
684 fb1a36c0 2022-01-09 op memcpy(&len, EVBUFFER_DATA(src), sizeof(len));
685 fb1a36c0 2022-01-09 op len = le32toh(len);
686 fb1a36c0 2022-01-09 op log_debug("expecting a message %"PRIu32" bytes long "
687 fb1a36c0 2022-01-09 op "(of wich %zu already read)",
688 fb1a36c0 2022-01-09 op len, EVBUFFER_LENGTH(src));
690 fb1a36c0 2022-01-09 op if (len < HEADERSIZE) {
691 fb1a36c0 2022-01-09 op log_warnx("invalid message size %d (too low)", len);
692 fb1a36c0 2022-01-09 op client_error(bev, EVBUFFER_READ, client);
696 fb1a36c0 2022-01-09 op if (len > client->msize) {
697 fb1a36c0 2022-01-09 op log_warnx("incoming message bigger than msize "
698 fb1a36c0 2022-01-09 op "(%"PRIu32" vs %"PRIu32")", len, client->msize);
699 fb1a36c0 2022-01-09 op client_error(bev, EVBUFFER_READ, client);
703 fb1a36c0 2022-01-09 op if (len > EVBUFFER_LENGTH(src))
706 fb1a36c0 2022-01-09 op listener_imsg_compose_client(client, IMSG_BUF, client->id,
707 fb1a36c0 2022-01-09 op EVBUFFER_DATA(src), len);
708 fb1a36c0 2022-01-09 op evbuffer_drain(src, len);
713 fb1a36c0 2022-01-09 op client_write(struct bufferevent *bev, void *d)
716 fb1a36c0 2022-01-09 op * here we can do some fancy logic like deciding when to call
718 fb1a36c0 2022-01-09 op * (*bev->errorcb)(bev, EVBUFFER_WRITE, bev->cbarg)
720 fb1a36c0 2022-01-09 op * to signal the end of the transaction.
727 fb1a36c0 2022-01-09 op client_error(struct bufferevent *bev, short err, void *d)
729 fb1a36c0 2022-01-09 op struct client *client = d;
730 fb1a36c0 2022-01-09 op struct evbuffer *buf;
732 fb1a36c0 2022-01-09 op if (err & EVBUFFER_ERROR) {
733 fb1a36c0 2022-01-09 op if (errno == EFBIG) {
734 fb1a36c0 2022-01-09 op bufferevent_enable(bev, EV_READ);
737 fb1a36c0 2022-01-09 op log_debug("buffer event error");
738 fb1a36c0 2022-01-09 op close_conn(client);
742 fb1a36c0 2022-01-09 op if (err & EVBUFFER_EOF) {
743 fb1a36c0 2022-01-09 op close_conn(client);
747 fb1a36c0 2022-01-09 op if (err & (EVBUFFER_READ|EVBUFFER_WRITE)) {
748 fb1a36c0 2022-01-09 op bufferevent_disable(bev, EV_READ|EV_WRITE);
749 fb1a36c0 2022-01-09 op client->done = 1;
751 fb1a36c0 2022-01-09 op buf = EVBUFFER_OUTPUT(client->bev);
752 fb1a36c0 2022-01-09 op if (EVBUFFER_LENGTH(buf) != 0) {
753 fb1a36c0 2022-01-09 op /* finish writing all the data first */
754 fb1a36c0 2022-01-09 op bufferevent_enable(client->bev, EV_WRITE);
758 fb1a36c0 2022-01-09 op close_conn(client);
762 fb1a36c0 2022-01-09 op log_warnx("unknown event error, closing client connection");
763 fb1a36c0 2022-01-09 op close_conn(client);
767 fb1a36c0 2022-01-09 op client_tls_readcb(int fd, short event, void *d)
769 fb1a36c0 2022-01-09 op struct bufferevent *bufev = d;
770 fb1a36c0 2022-01-09 op struct client *client = bufev->cbarg;
771 fb1a36c0 2022-01-09 op char buf[IBUF_READ_SIZE];
772 fb1a36c0 2022-01-09 op int what = EVBUFFER_READ;
773 fb1a36c0 2022-01-09 op int howmuch = IBUF_READ_SIZE;
777 fb1a36c0 2022-01-09 op if (event == EV_TIMEOUT) {
778 fb1a36c0 2022-01-09 op what |= EVBUFFER_TIMEOUT;
782 fb1a36c0 2022-01-09 op if (bufev->wm_read.high != 0)
783 fb1a36c0 2022-01-09 op howmuch = MIN(sizeof(buf), bufev->wm_read.high);
785 fb1a36c0 2022-01-09 op switch (ret = tls_read(client->ctx, buf, howmuch)) {
786 fb1a36c0 2022-01-09 op case TLS_WANT_POLLIN:
787 fb1a36c0 2022-01-09 op case TLS_WANT_POLLOUT:
790 fb1a36c0 2022-01-09 op what |= EVBUFFER_ERROR;
795 fb1a36c0 2022-01-09 op if (len == 0) {
796 fb1a36c0 2022-01-09 op what |= EVBUFFER_EOF;
800 fb1a36c0 2022-01-09 op if (evbuffer_add(bufev->input, buf, len) == -1) {
801 fb1a36c0 2022-01-09 op what |= EVBUFFER_ERROR;
805 fb1a36c0 2022-01-09 op event_add(&bufev->ev_read, NULL);
807 fb1a36c0 2022-01-09 op len = EVBUFFER_LENGTH(bufev->input);
808 fb1a36c0 2022-01-09 op if (bufev->wm_read.low != 0 && len < bufev->wm_read.low)
810 fb1a36c0 2022-01-09 op if (bufev->wm_read.high != 0 && len > bufev->wm_read.high) {
812 fb1a36c0 2022-01-09 op * here we could implement some read pressure
817 fb1a36c0 2022-01-09 op if (bufev->readcb != NULL)
818 fb1a36c0 2022-01-09 op (*bufev->readcb)(bufev, bufev->cbarg);
823 fb1a36c0 2022-01-09 op event_add(&bufev->ev_read, NULL);
827 fb1a36c0 2022-01-09 op (*bufev->errorcb)(bufev, what, bufev->cbarg);
831 fb1a36c0 2022-01-09 op client_tls_writecb(int fd, short event, void *d)
833 fb1a36c0 2022-01-09 op struct bufferevent *bufev = d;
834 fb1a36c0 2022-01-09 op struct client *client = bufev->cbarg;
837 fb1a36c0 2022-01-09 op short what = EVBUFFER_WRITE;
839 fb1a36c0 2022-01-09 op if (event == EV_TIMEOUT) {
840 fb1a36c0 2022-01-09 op what |= EVBUFFER_TIMEOUT;
844 fb1a36c0 2022-01-09 op if (EVBUFFER_LENGTH(bufev->output) != 0) {
845 fb1a36c0 2022-01-09 op ret = tls_write(client->ctx,
846 fb1a36c0 2022-01-09 op EVBUFFER_DATA(bufev->output),
847 fb1a36c0 2022-01-09 op EVBUFFER_LENGTH(bufev->output));
848 fb1a36c0 2022-01-09 op switch (ret) {
849 fb1a36c0 2022-01-09 op case TLS_WANT_POLLIN:
850 fb1a36c0 2022-01-09 op case TLS_WANT_POLLOUT:
853 fb1a36c0 2022-01-09 op what |= EVBUFFER_ERROR;
857 fb1a36c0 2022-01-09 op evbuffer_drain(bufev->output, len);
860 fb1a36c0 2022-01-09 op if (EVBUFFER_LENGTH(bufev->output) != 0)
861 fb1a36c0 2022-01-09 op event_add(&bufev->ev_write, NULL);
863 fb1a36c0 2022-01-09 op if (bufev->writecb != NULL &&
864 fb1a36c0 2022-01-09 op EVBUFFER_LENGTH(bufev->output) <= bufev->wm_write.low)
865 fb1a36c0 2022-01-09 op (*bufev->writecb)(bufev, bufev->cbarg);
869 fb1a36c0 2022-01-09 op event_add(&bufev->ev_write, NULL);
873 fb1a36c0 2022-01-09 op (*bufev->errorcb)(bufev, what, bufev->cbarg);
877 fb1a36c0 2022-01-09 op close_conn(struct client *c)
879 fb1a36c0 2022-01-09 op log_debug("closing connection");
881 fb1a36c0 2022-01-09 op if (c->iev.ibuf.fd != -1) {
882 fb1a36c0 2022-01-09 op listener_imsg_compose_client(c, IMSG_CONN_GONE, 0, NULL, 0);
883 fb1a36c0 2022-01-09 op imsg_flush(&c->iev.ibuf);
884 fb1a36c0 2022-01-09 op msgbuf_clear(&c->iev.ibuf.w);
885 fb1a36c0 2022-01-09 op event_del(&c->iev.ev);
886 fb1a36c0 2022-01-09 op close(c->iev.ibuf.fd);
889 fb1a36c0 2022-01-09 op handle_close(c->fd, 0, c);
893 fb1a36c0 2022-01-09 op handle_close(int fd, short ev, void *d)
895 fb1a36c0 2022-01-09 op struct client *c = d;
897 fb1a36c0 2022-01-09 op switch (tls_close(c->ctx)) {
898 fb1a36c0 2022-01-09 op case TLS_WANT_POLLIN:
899 fb1a36c0 2022-01-09 op yield_r(c, handle_close);
901 fb1a36c0 2022-01-09 op case TLS_WANT_POLLOUT:
902 fb1a36c0 2022-01-09 op yield_w(c, handle_close);
906 fb1a36c0 2022-01-09 op event_del(&c->event);
907 fb1a36c0 2022-01-09 op tls_free(c->ctx);
908 fb1a36c0 2022-01-09 op close(c->fd);