… | |
… | |
32 | #include <cstdlib> |
32 | #include <cstdlib> |
33 | #include <cstring> |
33 | #include <cstring> |
34 | #include <csignal> |
34 | #include <csignal> |
35 | |
35 | |
36 | #include <sys/types.h> |
36 | #include <sys/types.h> |
37 | #include <sys/socket.h> |
|
|
38 | #include <unistd.h> |
37 | #include <unistd.h> |
39 | #include <fcntl.h> |
38 | #include <fcntl.h> |
40 | |
39 | |
41 | #ifdef HAVE_SYS_IOCTL_H |
40 | #ifdef HAVE_SYS_IOCTL_H |
42 | # include <sys/ioctl.h> |
41 | # include <sys/ioctl.h> |
… | |
… | |
372 | } |
371 | } |
373 | |
372 | |
374 | return true; |
373 | return true; |
375 | } |
374 | } |
376 | |
375 | |
377 | ///////////////////////////////////////////////////////////////////////////// |
|
|
378 | // helper/proxy support |
|
|
379 | |
|
|
380 | #if PTYTTY_HELPER |
|
|
381 | |
|
|
382 | static int sock_fd = -1, lock_fd = -1; |
|
|
383 | static int helper_pid, owner_pid; |
|
|
384 | |
|
|
385 | struct command |
|
|
386 | { |
|
|
387 | enum { get, login, destroy } type; |
|
|
388 | |
|
|
389 | ptytty *id; |
|
|
390 | |
|
|
391 | bool login_shell; |
|
|
392 | int cmd_pid; |
|
|
393 | char hostname[512]; // arbitrary, but should be plenty |
|
|
394 | }; |
|
|
395 | |
|
|
396 | struct ptytty_proxy : ptytty |
|
|
397 | { |
|
|
398 | ptytty *id; |
|
|
399 | |
|
|
400 | ptytty_proxy () |
|
|
401 | : id(0) |
|
|
402 | { |
|
|
403 | } |
|
|
404 | |
|
|
405 | ~ptytty_proxy (); |
|
|
406 | |
|
|
407 | bool get (); |
|
|
408 | void login (int cmd_pid, bool login_shell, const char *hostname); |
|
|
409 | }; |
|
|
410 | |
|
|
411 | #if PTYTTY_REENTRANT |
|
|
412 | # define NEED_TOKEN do { char ch; read (lock_fd, &ch, 1); } while (0) |
|
|
413 | # define GIVE_TOKEN do { char ch; write (lock_fd, &ch, 1); } while (0) |
|
|
414 | #else |
|
|
415 | # define NEED_TOKEN (void)0 |
|
|
416 | # define GIVE_TOKEN (void)0 |
|
|
417 | #endif |
|
|
418 | |
|
|
419 | bool |
|
|
420 | ptytty_proxy::get () |
|
|
421 | { |
|
|
422 | NEED_TOKEN; |
|
|
423 | |
|
|
424 | command cmd; |
|
|
425 | |
|
|
426 | cmd.type = command::get; |
|
|
427 | |
|
|
428 | write (sock_fd, &cmd, sizeof (cmd)); |
|
|
429 | |
|
|
430 | if (read (sock_fd, &id, sizeof (id)) != sizeof (id)) |
|
|
431 | ptytty_fatal ("protocol error while creating pty using helper process, aborting.\n"); |
|
|
432 | |
|
|
433 | if (!id) |
|
|
434 | { |
|
|
435 | GIVE_TOKEN; |
|
|
436 | return false; |
|
|
437 | } |
|
|
438 | |
|
|
439 | if ((pty = recv_fd (sock_fd)) < 0 |
|
|
440 | || (tty = recv_fd (sock_fd)) < 0) |
|
|
441 | ptytty_fatal ("protocol error while reading pty/tty fds from helper process, aborting.\n"); |
|
|
442 | |
|
|
443 | GIVE_TOKEN; |
|
|
444 | return true; |
|
|
445 | } |
|
|
446 | |
|
|
447 | void |
|
|
448 | ptytty_proxy::login (int cmd_pid, bool login_shell, const char *hostname) |
|
|
449 | { |
|
|
450 | NEED_TOKEN; |
|
|
451 | |
|
|
452 | command cmd; |
|
|
453 | |
|
|
454 | cmd.type = command::login; |
|
|
455 | cmd.id = id; |
|
|
456 | cmd.cmd_pid = cmd_pid; |
|
|
457 | cmd.login_shell = login_shell; |
|
|
458 | strncpy (cmd.hostname, hostname, sizeof (cmd.hostname)); |
|
|
459 | |
|
|
460 | write (sock_fd, &cmd, sizeof (cmd)); |
|
|
461 | |
|
|
462 | GIVE_TOKEN; |
|
|
463 | } |
|
|
464 | |
|
|
465 | ptytty_proxy::~ptytty_proxy () |
|
|
466 | { |
|
|
467 | if (id) |
|
|
468 | { |
|
|
469 | NEED_TOKEN; |
|
|
470 | |
|
|
471 | command cmd; |
|
|
472 | |
|
|
473 | cmd.type = command::destroy; |
|
|
474 | cmd.id = id; |
|
|
475 | |
|
|
476 | write (sock_fd, &cmd, sizeof (cmd)); |
|
|
477 | |
|
|
478 | GIVE_TOKEN; |
|
|
479 | } |
|
|
480 | } |
|
|
481 | |
|
|
482 | static |
|
|
483 | void serve () |
|
|
484 | { |
|
|
485 | command cmd; |
|
|
486 | vector<ptytty *> ptys; |
|
|
487 | |
|
|
488 | for (;;) |
|
|
489 | { |
|
|
490 | GIVE_TOKEN; |
|
|
491 | |
|
|
492 | if (read (sock_fd, &cmd, sizeof (command)) != sizeof (command)) |
|
|
493 | break; |
|
|
494 | |
|
|
495 | if (cmd.type == command::get) |
|
|
496 | { |
|
|
497 | // -> id ptyfd ttyfd |
|
|
498 | cmd.id = new ptytty_unix; |
|
|
499 | |
|
|
500 | if (cmd.id->get ()) |
|
|
501 | { |
|
|
502 | write (sock_fd, &cmd.id, sizeof (cmd.id)); |
|
|
503 | ptys.push_back (cmd.id); |
|
|
504 | |
|
|
505 | ptytty::send_fd (sock_fd, cmd.id->pty); |
|
|
506 | ptytty::send_fd (sock_fd, cmd.id->tty); |
|
|
507 | } |
|
|
508 | else |
|
|
509 | { |
|
|
510 | delete cmd.id; |
|
|
511 | cmd.id = 0; |
|
|
512 | write (sock_fd, &cmd.id, sizeof (cmd.id)); |
|
|
513 | } |
|
|
514 | } |
|
|
515 | else if (cmd.type == command::login) |
|
|
516 | { |
|
|
517 | #if UTMP_SUPPORT |
|
|
518 | if (find (ptys.begin (), ptys.end (), cmd.id) != ptys.end ()) |
|
|
519 | { |
|
|
520 | cmd.hostname[sizeof (cmd.hostname) - 1] = 0; |
|
|
521 | cmd.id->login (cmd.cmd_pid, cmd.login_shell, cmd.hostname); |
|
|
522 | } |
|
|
523 | #endif |
|
|
524 | } |
|
|
525 | else if (cmd.type == command::destroy) |
|
|
526 | { |
|
|
527 | vector<ptytty *>::iterator pty = find (ptys.begin (), ptys.end (), cmd.id); |
|
|
528 | |
|
|
529 | if (pty != ptys.end ()) |
|
|
530 | { |
|
|
531 | delete *pty; |
|
|
532 | ptys.erase (pty); |
|
|
533 | } |
|
|
534 | } |
|
|
535 | else |
|
|
536 | break; |
|
|
537 | |
|
|
538 | NEED_TOKEN; |
|
|
539 | } |
|
|
540 | |
|
|
541 | // destroy all ptys |
|
|
542 | for (vector<ptytty *>::iterator i = ptys.end (); i-- > ptys.begin (); ) |
|
|
543 | delete *i; |
|
|
544 | } |
|
|
545 | |
|
|
546 | void |
|
|
547 | ptytty::use_helper () |
|
|
548 | { |
|
|
549 | #ifndef PTYTTY_NO_PID_CHECK |
|
|
550 | int pid = getpid (); |
|
|
551 | #endif |
|
|
552 | |
|
|
553 | if (sock_fd >= 0 |
|
|
554 | #ifndef PTYTTY_NO_PID_CHECK |
|
|
555 | && pid == owner_pid |
|
|
556 | #endif |
|
|
557 | ) |
|
|
558 | return; |
|
|
559 | |
|
|
560 | #ifndef PTYTTY_NO_PID_CHECK |
|
|
561 | owner_pid = pid; |
|
|
562 | #endif |
|
|
563 | |
|
|
564 | int sv[2]; |
|
|
565 | |
|
|
566 | if (socketpair (AF_UNIX, SOCK_STREAM, 0, sv)) |
|
|
567 | ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n"); |
|
|
568 | |
|
|
569 | #ifdef PTYTTY_REENTRANT |
|
|
570 | int lv[2]; |
|
|
571 | |
|
|
572 | if (socketpair (AF_UNIX, SOCK_STREAM, 0, lv)) |
|
|
573 | ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n"); |
|
|
574 | #endif |
|
|
575 | |
|
|
576 | helper_pid = fork (); |
|
|
577 | |
|
|
578 | if (helper_pid < 0) |
|
|
579 | ptytty_fatal ("could not create pty/sessiondb helper process, aborting.\n"); |
|
|
580 | |
|
|
581 | if (helper_pid) |
|
|
582 | { |
|
|
583 | // client, process |
|
|
584 | sock_fd = sv[0]; |
|
|
585 | close (sv[1]); |
|
|
586 | fcntl (sock_fd, F_SETFD, FD_CLOEXEC); |
|
|
587 | #ifdef PTYTTY_REENTRANT |
|
|
588 | lock_fd = lv[0]; |
|
|
589 | close (lv[1]); |
|
|
590 | fcntl (lock_fd, F_SETFD, FD_CLOEXEC); |
|
|
591 | #endif |
|
|
592 | } |
|
|
593 | else |
|
|
594 | { |
|
|
595 | // server, pty-helper |
|
|
596 | sock_fd = sv[1]; |
|
|
597 | #ifdef PTYTTY_REENTRANT |
|
|
598 | lock_fd = lv[1]; |
|
|
599 | #endif |
|
|
600 | |
|
|
601 | chdir ("/"); |
|
|
602 | |
|
|
603 | signal (SIGHUP, SIG_IGN); |
|
|
604 | signal (SIGTERM, SIG_IGN); |
|
|
605 | signal (SIGINT, SIG_IGN); |
|
|
606 | signal (SIGPIPE, SIG_IGN); |
|
|
607 | |
|
|
608 | for (int fd = 0; fd < 1023; fd++) |
|
|
609 | if (fd != sock_fd && fd != lock_fd) |
|
|
610 | close (fd); |
|
|
611 | |
|
|
612 | serve (); |
|
|
613 | _exit (EXIT_SUCCESS); |
|
|
614 | } |
|
|
615 | } |
|
|
616 | |
|
|
617 | #endif |
|
|
618 | |
|
|
619 | ptytty * |
|
|
620 | ptytty::create () |
|
|
621 | { |
|
|
622 | #if PTYTTY_HELPER |
|
|
623 | if (helper_pid |
|
|
624 | # ifndef PTYTTY_NO_PID_CHECK |
|
|
625 | && getpid () == owner_pid |
|
|
626 | # endif |
|
|
627 | ) |
|
|
628 | // use helper process |
|
|
629 | return new ptytty_proxy; |
|
|
630 | else |
|
|
631 | #endif |
|
|
632 | return new ptytty_unix; |
|
|
633 | } |
|
|
634 | |
|
|
635 | void |
|
|
636 | ptytty::init () |
|
|
637 | { |
|
|
638 | uid_t uid = getuid (); |
|
|
639 | gid_t gid = getgid (); |
|
|
640 | |
|
|
641 | // before doing anything else, check for setuid/setgid operation, |
|
|
642 | // start the helper process and drop privileges |
|
|
643 | if (uid != geteuid () |
|
|
644 | || gid != getegid ()) |
|
|
645 | { |
|
|
646 | #if PTYTTY_HELPER |
|
|
647 | use_helper (); |
|
|
648 | #else |
|
|
649 | ptytty_warn ("running setuid/setgid without pty helper compiled in, continuing unprivileged.\n"); |
|
|
650 | #endif |
|
|
651 | |
|
|
652 | drop_privileges (); |
|
|
653 | } |
|
|
654 | } |
|
|
655 | |
|
|
656 | void |
|
|
657 | ptytty::drop_privileges () |
|
|
658 | { |
|
|
659 | uid_t uid = getuid (); |
|
|
660 | gid_t gid = getgid (); |
|
|
661 | |
|
|
662 | // drop privileges |
|
|
663 | #if HAVE_SETRESUID |
|
|
664 | setresgid (gid, gid, gid); |
|
|
665 | setresuid (uid, uid, uid); |
|
|
666 | #elif HAVE_SETREUID |
|
|
667 | setregid (gid, gid); |
|
|
668 | setreuid (uid, uid); |
|
|
669 | #elif HAVE_SETUID |
|
|
670 | setgid (gid); |
|
|
671 | setuid (uid); |
|
|
672 | #endif |
|
|
673 | |
|
|
674 | if (uid != geteuid () |
|
|
675 | || gid != getegid ()) |
|
|
676 | ptytty_fatal ("unable to drop privileges, aborting.\n"); |
|
|
677 | } |
|
|
678 | |
|
|
679 | ///////////////////////////////////////////////////////////////////////////// |
|
|
680 | // C API |
|
|
681 | |
|
|
682 | #ifndef PTYTTY_NO_C_API |
|
|
683 | |
|
|
684 | #define DEFINE_METHOD(retval, name, args1, args2) \ |
|
|
685 | extern "C" retval ptytty_ ## name args1 \ |
|
|
686 | { return ((struct ptytty *)ptytty)->name args2; } |
|
|
687 | |
|
|
688 | DEFINE_METHOD(int,pty,(void *ptytty),) |
|
|
689 | DEFINE_METHOD(int,tty,(void *ptytty),) |
|
|
690 | DEFINE_METHOD(int,get,(void *ptytty),()) |
|
|
691 | DEFINE_METHOD(void,login,(void *ptytty, int cmd_pid, bool login_shell, const char *hostname),(cmd_pid,login_shell,hostname)) |
|
|
692 | |
|
|
693 | DEFINE_METHOD(void,close_tty,(void *ptytty),()) |
|
|
694 | DEFINE_METHOD(int,make_controlling_tty,(void *ptytty),()) |
|
|
695 | DEFINE_METHOD(void,set_utf8_mode,(void *ptytty, int on),(on)) |
|
|
696 | |
|
|
697 | #define DEFINE_STATIC(retval, name, args) \ |
|
|
698 | extern "C" retval ptytty_ ## name args \ |
|
|
699 | { return ptytty::name args; } |
|
|
700 | |
|
|
701 | DEFINE_STATIC(void,drop_privileges,()) |
|
|
702 | DEFINE_STATIC(void,use_helper,()) |
|
|
703 | DEFINE_STATIC(void,init,()) |
|
|
704 | |
|
|
705 | DEFINE_STATIC(void *,create,()) |
|
|
706 | |
|
|
707 | void ptytty_delete (void *ptytty) |
|
|
708 | { |
|
|
709 | delete (struct ptytty *)ptytty; |
|
|
710 | } |
|
|
711 | |
|
|
712 | // send_fd, recv_fd not exposed |
|
|
713 | |
|
|
714 | #endif |
|
|