ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/libptytty/src/proxy.C
Revision: 1.24
Committed: Fri Apr 10 11:59:52 2015 UTC (9 years, 2 months ago) by sf-exg
Content type: text/plain
Branch: MAIN
CVS Tags: rxvt-unicode-rel-9_26, rxvt-unicode-rel-9_25, rxvt-unicode-rel-9_22, rel-1_8
Changes since 1.23: +1 -1 lines
Log Message:
Use PTYTTY_FATAL in sanitise_stdfd.

File Contents

# Content
1 /*----------------------------------------------------------------------*
2 * File: proxy.C
3 *----------------------------------------------------------------------*
4 *
5 * All portions of code are copyright by their respective author/s.
6 * Copyright (c) 2006 Marc Lehmann <schmorp@schmorp.de>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 *---------------------------------------------------------------------*/
22
23 #include "config.h"
24
25 #include "ptytty.h"
26
27 #include "estl.h"
28
29 #include <stdio.h>
30 #include <string.h>
31 #include <signal.h>
32
33 #include <sys/types.h>
34 #include <sys/socket.h>
35 #include <unistd.h>
36 #include <fcntl.h>
37 #include <errno.h>
38
39 // helper/proxy support
40
41 #if PTYTTY_HELPER
42
43 static int sock_fd = -1, lock_fd = -1;
44 static int helper_pid;
45
46 struct command
47 {
48 enum { get, login, destroy } type;
49
50 ptytty *id;
51
52 bool login_shell;
53 int cmd_pid;
54 char hostname[512]; // arbitrary, but should be plenty
55 };
56
57 struct ptytty_proxy : ptytty
58 {
59 ptytty *id;
60
61 ptytty_proxy ()
62 : id(0)
63 {
64 }
65
66 ~ptytty_proxy ();
67
68 bool get ();
69 void login (int cmd_pid, bool login_shell, const char *hostname);
70 };
71
72 #if PTYTTY_REENTRANT
73 # define NEED_TOKEN do { char ch; read (lock_fd, &ch , 1); } while (0)
74 # define GIVE_TOKEN write (lock_fd, &lock_fd, 1)
75 #else
76 # define NEED_TOKEN (void)0
77 # define GIVE_TOKEN (void)0
78 #endif
79
80 bool
81 ptytty_proxy::get ()
82 {
83 NEED_TOKEN;
84
85 command cmd;
86
87 cmd.type = command::get;
88
89 write (sock_fd, &cmd, sizeof (cmd));
90
91 if (read (sock_fd, &id, sizeof (id)) != sizeof (id))
92 PTYTTY_FATAL ("protocol error while creating pty using helper process, aborting.\n");
93
94 if (!id)
95 {
96 GIVE_TOKEN;
97 return false;
98 }
99
100 if ((pty = recv_fd (sock_fd)) < 0
101 || (tty = recv_fd (sock_fd)) < 0)
102 PTYTTY_FATAL ("protocol error while reading pty/tty fds from helper process, aborting.\n");
103
104 GIVE_TOKEN;
105 return true;
106 }
107
108 void
109 ptytty_proxy::login (int cmd_pid, bool login_shell, const char *hostname)
110 {
111 NEED_TOKEN;
112
113 command cmd;
114
115 cmd.type = command::login;
116 cmd.id = id;
117 cmd.cmd_pid = cmd_pid;
118 cmd.login_shell = login_shell;
119 strncpy (cmd.hostname, hostname, sizeof (cmd.hostname));
120
121 write (sock_fd, &cmd, sizeof (cmd));
122
123 GIVE_TOKEN;
124 }
125
126 ptytty_proxy::~ptytty_proxy ()
127 {
128 if (id)
129 {
130 close_tty ();
131
132 if (pty >= 0)
133 close (pty);
134
135 NEED_TOKEN;
136
137 command cmd;
138
139 cmd.type = command::destroy;
140 cmd.id = id;
141
142 write (sock_fd, &cmd, sizeof (cmd));
143
144 GIVE_TOKEN;
145 }
146 }
147
148 static
149 void serve ()
150 {
151 command cmd;
152 vector<ptytty *> ptys;
153
154 for (;;)
155 {
156 GIVE_TOKEN;
157
158 if (read (sock_fd, &cmd, sizeof (command)) != sizeof (command))
159 break;
160
161 if (cmd.type == command::get)
162 {
163 // -> id ptyfd ttyfd
164 cmd.id = new ptytty_unix;
165
166 if (cmd.id->get ())
167 {
168 write (sock_fd, &cmd.id, sizeof (cmd.id));
169 ptys.push_back (cmd.id);
170
171 ptytty::send_fd (sock_fd, cmd.id->pty);
172 ptytty::send_fd (sock_fd, cmd.id->tty);
173
174 cmd.id->close_tty ();
175 }
176 else
177 {
178 delete cmd.id;
179 cmd.id = 0;
180 write (sock_fd, &cmd.id, sizeof (cmd.id));
181 }
182 }
183 else if (cmd.type == command::login)
184 {
185 #if UTMP_SUPPORT
186 if (find (ptys.begin (), ptys.end (), cmd.id) != ptys.end ())
187 {
188 cmd.hostname[sizeof (cmd.hostname) - 1] = 0;
189 cmd.id->login (cmd.cmd_pid, cmd.login_shell, cmd.hostname);
190 }
191 #endif
192 }
193 else if (cmd.type == command::destroy)
194 {
195 vector<ptytty *>::iterator pty = find (ptys.begin (), ptys.end (), cmd.id);
196
197 if (pty != ptys.end ())
198 {
199 delete *pty;
200 ptys.erase (pty);
201 }
202 }
203 else
204 break;
205
206 NEED_TOKEN;
207 }
208
209 // destroy all ptys
210 for (vector<ptytty *>::iterator i = ptys.end (); i-- > ptys.begin (); )
211 delete *i;
212 }
213
214 void
215 ptytty::use_helper ()
216 {
217 if (sock_fd >= 0)
218 return;
219
220 int sv[2];
221
222 if (socketpair (AF_UNIX, SOCK_STREAM, 0, sv))
223 PTYTTY_FATAL ("could not create socket to communicate with pty/sessiondb helper, aborting.\n");
224
225 #if PTYTTY_REENTRANT
226 int lv[2];
227
228 if (socketpair (AF_UNIX, SOCK_STREAM, 0, lv))
229 PTYTTY_FATAL ("could not create socket to communicate with pty/sessiondb helper, aborting.\n");
230 #endif
231
232 helper_pid = fork ();
233
234 if (helper_pid < 0)
235 PTYTTY_FATAL ("could not create pty/sessiondb helper process, aborting.\n");
236
237 if (helper_pid)
238 {
239 // client, process
240 sock_fd = sv[0];
241 close (sv[1]);
242 fcntl (sock_fd, F_SETFD, FD_CLOEXEC);
243 #if PTYTTY_REENTRANT
244 lock_fd = lv[0];
245 close (lv[1]);
246 fcntl (lock_fd, F_SETFD, FD_CLOEXEC);
247 #endif
248 }
249 else
250 {
251 // server, pty-helper
252 sock_fd = sv[1];
253 #if PTYTTY_REENTRANT
254 lock_fd = lv[1];
255 #endif
256
257 chdir ("/");
258
259 signal (SIGHUP, SIG_IGN);
260 signal (SIGTERM, SIG_IGN);
261 signal (SIGINT, SIG_IGN);
262 signal (SIGPIPE, SIG_IGN);
263
264 for (int fd = 0; fd < 1023; fd++)
265 if (fd != sock_fd && fd != lock_fd)
266 close (fd);
267
268 serve ();
269 _exit (EXIT_SUCCESS);
270 }
271 }
272
273 #endif
274
275 ptytty *
276 ptytty::create ()
277 {
278 #if PTYTTY_HELPER
279 if (helper_pid)
280 // use helper process
281 return new ptytty_proxy;
282 else
283 #endif
284 return new ptytty_unix;
285 }
286
287 void
288 ptytty::sanitise_stdfd ()
289 {
290 // sanitise stdin/stdout/stderr to point to *something*.
291 for (int fd = 0; fd <= 2; ++fd)
292 if (fcntl (fd, F_GETFL) < 0 && errno == EBADF)
293 {
294 int fd2 = open ("/dev/tty", fd ? O_WRONLY : O_RDONLY);
295
296 if (fd2 < 0)
297 fd2 = open ("/dev/null", fd ? O_WRONLY : O_RDONLY);
298
299 if (fd2 != fd)
300 PTYTTY_FATAL ("unable to sanitise fds, aborting.\n");
301 }
302 }
303
304 void
305 ptytty::init ()
306 {
307 sanitise_stdfd ();
308
309 uid_t uid = getuid ();
310 gid_t gid = getgid ();
311
312 // before doing anything else, check for setuid/setgid operation,
313 // start the helper process and drop privileges
314 if (uid != geteuid ()
315 || gid != getegid ())
316 {
317 #if PTYTTY_HELPER
318 use_helper ();
319 #else
320 PTYTTY_WARN ("running setuid/setgid without pty helper compiled in, continuing unprivileged.\n");
321 #endif
322
323 drop_privileges ();
324 }
325 }
326
327 void
328 ptytty::drop_privileges ()
329 {
330 uid_t uid = getuid ();
331 gid_t gid = getgid ();
332
333 // drop privileges
334 #if HAVE_SETRESUID
335 setresgid (gid, gid, gid);
336 setresuid (uid, uid, uid);
337 #elif HAVE_SETREUID
338 setregid (gid, gid);
339 setreuid (uid, uid);
340 #elif HAVE_SETUID
341 setgid (gid);
342 setuid (uid);
343 #else
344 # error no way to drop privileges, configure failed?
345 #endif
346
347 if (uid != geteuid ()
348 || gid != getegid ())
349 PTYTTY_FATAL ("unable to drop privileges, aborting.\n");
350 }
351