summaryrefslogtreecommitdiffstats
path: root/usr.sbin/rwhod/rwhod.c
Commit message (Collapse)AuthorAgeFilesLines
* Merge an applicable subset of r263234 from HEAD to stable/10:rwatson2015-03-191-1/+1
| | | | | | | | | | | | | Update most userspace consumers of capability.h to use capsicum.h instead. auditdistd is not updated as I will make the change upstream and then do a vendor import sometime in the next week or two. Note that a significant fraction does not apply, as FreeBSD 10 doesn't contain a Capsicumised ping, casperd, libcasper, etc. When these features are merged, the capsicum.h change will need to be merged with them. Sponsored by: Google, Inc.
* Remove fallback to fork(2) if pdfork(2) is not available. If the parentpjd2013-09-051-10/+6
| | | | | | | | | | | | | | | | process dies, the process descriptor will be closed and pdfork(2)ed child will be killed, which is not the case when regular fork(2) is used. The PROCDESC option is now part of the GENERIC kernel configuration, so we can start depending on it. Add UPDATING entry to inform that this option is now required and log detailed instruction to syslog if pdfork(2) is not available: The pdfork(2) system call is not available; recompile the kernel with options PROCDESC Submitted by: Mariusz Zaborski <oshogbo@FreeBSD.org> Sponsored by: Google Summer of Code 2013
* Change the cap_rights_t type from uint64_t to a structure that we can extendpjd2013-09-051-4/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | in the future in a backward compatible (API and ABI) way. The cap_rights_t represents capability rights. We used to use one bit to represent one right, but we are running out of spare bits. Currently the new structure provides place for 114 rights (so 50 more than the previous cap_rights_t), but it is possible to grow the structure to hold at least 285 rights, although we can make it even larger if 285 rights won't be enough. The structure definition looks like this: struct cap_rights { uint64_t cr_rights[CAP_RIGHTS_VERSION + 2]; }; The initial CAP_RIGHTS_VERSION is 0. The top two bits in the first element of the cr_rights[] array contain total number of elements in the array - 2. This means if those two bits are equal to 0, we have 2 array elements. The top two bits in all remaining array elements should be 0. The next five bits in all array elements contain array index. Only one bit is used and bit position in this five-bits range defines array index. This means there can be at most five array elements in the future. To define new right the CAPRIGHT() macro must be used. The macro takes two arguments - an array index and a bit to set, eg. #define CAP_PDKILL CAPRIGHT(1, 0x0000000000000800ULL) We still support aliases that combine few rights, but the rights have to belong to the same array element, eg: #define CAP_LOOKUP CAPRIGHT(0, 0x0000000000000400ULL) #define CAP_FCHMOD CAPRIGHT(0, 0x0000000000002000ULL) #define CAP_FCHMODAT (CAP_FCHMOD | CAP_LOOKUP) There is new API to manage the new cap_rights_t structure: cap_rights_t *cap_rights_init(cap_rights_t *rights, ...); void cap_rights_set(cap_rights_t *rights, ...); void cap_rights_clear(cap_rights_t *rights, ...); bool cap_rights_is_set(const cap_rights_t *rights, ...); bool cap_rights_is_valid(const cap_rights_t *rights); void cap_rights_merge(cap_rights_t *dst, const cap_rights_t *src); void cap_rights_remove(cap_rights_t *dst, const cap_rights_t *src); bool cap_rights_contains(const cap_rights_t *big, const cap_rights_t *little); Capability rights to the cap_rights_init(), cap_rights_set(), cap_rights_clear() and cap_rights_is_set() functions are provided by separating them with commas, eg: cap_rights_t rights; cap_rights_init(&rights, CAP_READ, CAP_WRITE, CAP_FSTAT); There is no need to terminate the list of rights, as those functions are actually macros that take care of the termination, eg: #define cap_rights_set(rights, ...) \ __cap_rights_set((rights), __VA_ARGS__, 0ULL) void __cap_rights_set(cap_rights_t *rights, ...); Thanks to using one bit as an array index we can assert in those functions that there are no two rights belonging to different array elements provided together. For example this is illegal and will be detected, because CAP_LOOKUP belongs to element 0 and CAP_PDKILL to element 1: cap_rights_init(&rights, CAP_LOOKUP | CAP_PDKILL); Providing several rights that belongs to the same array's element this way is correct, but is not advised. It should only be used for aliases definition. This commit also breaks compatibility with some existing Capsicum system calls, but I see no other way to do that. This should be fine as Capsicum is still experimental and this change is not going to 9.x. Sponsored by: The FreeBSD Foundation
* Cast argument of is*() ctype functions to unsigned char.pjd2013-08-181-1/+4
| | | | | | | | Without the cast there is ambiguity between 0xFF and -1 (EOF). Suggested by: jilles Submitted by: Mariusz Zaborski <oshogbo@FreeBSD.org> Sponsored by: Google Summer of Code 2013
* Unbreak rwhod(8):hrs2013-08-171-1/+10
| | | | | | | | | | - It did not work with GENERIC kernel after r250603 because options PROCDESC was required for pdfork(2). It now just uses fork(2) instead when this syscall is not available. - Fix verify(). This function was broken in r250602 because the outermost "()" was removed from the condition !(isalnum() || ispunct()). It prevented hostnames including "-", for example.
* Sandbox rwhod(8) receiver process using capability mode and Capsicumpjd2013-07-031-2/+24
| | | | | | | | | | | | capabilities. rwhod(8) receiver can now only receive packages, write to /var/rwho/ directory and log to syslog. Submitted by: Mariusz Zaborski <oshogbo@FreeBSD.org> Sponsored by: Google Summer of Code 2013 Reviewed by: pjd MFC after: 1 month
* The whole sending functionality was implemented within signal handler,pjd2013-07-031-133/+161
| | | | | | | | | | which is very bad idea. Split sending and receiving in two processes, which fixes this problem and will help to sandbox rwhod. Submitted by: Mariusz Zaborski <oshogbo@FreeBSD.org> Sponsored by: Google Summer of Code 2013 Reviewed by: pjd MFC after: 1 month
* Style cleanups.pjd2013-07-031-187/+199
| | | | | | | Submitted by: Mariusz Zaborski <oshogbo@FreeBSD.org> Sponsored by: Google Summer of Code 2013 Reviewed by: pjd MFC after: 1 month
* Replace index() and rindex() calls with strchr() and strrchr().ed2012-01-031-1/+1
| | | | | | | | | | The index() and rindex() functions were marked LEGACY in the 2001 revision of POSIX and were subsequently removed from the 2008 revision. The strchr() and strrchr() functions are part of the C standard. This makes the source code a lot more consistent, as most of these C files also call into other str*() routines. In fact, about a dozen already perform strchr() calls.
* Check return code of setuid(), setgid(), and setgroups() in rwhod.simon2011-04-231-3/+12
| | | | | | | While they will not fail in normal circumstances, better safe than sorry. MFC after: 1 week
* Port all applications in usr.sbin/ from libulog to utmpx.ed2010-01-131-2/+1
|
* Let rwhod use libulog.ed2009-12-271-62/+27
| | | | | | | | | | | | I am not planning on providing a mechanism tot stat() the database files directly. The disadvantage of this, is that rwhod will now be a little bit more heavy than it used to be. It normally used to fstat() the file descriptor to see whether the file had changed, but this is now impossible to implement, meaning we have to parse the entire utmp file each 180 seconds. This is probably not an issue on modern 16-way servers, but if it turns out to be a problem, we'll think of something.
* - Avoid a memory leak if realloc(3) fails by using reallocf(3)ssouhlal2005-06-031-5/+2
| | | | | | Submitted by: Liam J. Foy <liamfoy@dragonflybsd.org> Approved by: mdodd (in-lieu of mentor who is away) MFC after: 1 week
* Fix most cases where the address of an int is passed to a function expecting astefanf2005-02-141-1/+2
| | | | socklen_t * argument.
* Per letter dated July 22, 1999 remove 3rd clause of Berkeley derived softwareimp2004-08-071-4/+0
| | | | (with permission of addtional copyright holders where appropriate)
* Replace ROUNDUP/ADVANCE with SA_SIZEluigi2004-04-131-5/+1
|
* de-__Pcharnier2003-07-061-7/+7
| | | | | use port/proto to represent services (not proto/port). add FBSDID
* WARNS=4, de-__P()alfred2002-07-111-27/+27
|
* I've been meaning to do this for a while. Add an underscore to thedillon2002-01-191-4/+4
| | | | | | | | time_to_xxx() and xxx_to_time() functions. e.g. _time_to_xxx() instead of time_to_xxx(), to make it more obvious that these are stopgap functions & placemarkers and not meant to create a defacto standard. They will eventually be replaced when a real standard comes out of committee.
* Convert time_t to/from 32 bit representations for transmission overdillon2001-10-281-4/+6
| | | | a network and storage.
* Ensure that received packets are at least as long as the rwho packetiedowse2000-12-221-4/+10
| | | | | | | | | | | | | header before trying to process them. Without this sanity check, rwhod can attempt to byte-swap all of memory when a short packet is received, and so dies with a SIGBUS. While I'm here, change two other syslog messages to be more informative: use dotted quad rather than hex notation for IP addresses, and include the source IP in the 'bad from port' message. PR: bin/14844 Reviewed by: dwmalone
* Don't call syslog() without a format string.kris2000-07-121-1/+1
|
* Name of program and trailing \n will be added by syslog(3)charnier1999-11-271-2/+2
|
* $Id$ -> $FreeBSD$peter1999-08-281-1/+1
|
* Correct usage messagebrian1999-06-261-2/+2
|
* Add the -p switch - tells rwhod to ignore POINTOPOINT interfaces.brian1999-06-161-2/+5
| | | | | Mostly submitted by: Stefan Zehl <sec@42.org> PR: 12216
* Implement the -l commandline option which turns off broadcast ofsteve1999-01-111-4/+9
| | | | | | | information, but still allows you to monitor other machines. PR: 9301 Submitted by: Matthew Fuller <fullermd@futuresouth.com>
* Add an option for insecure mode, in which rwhod does not discard packetsdes1998-12-171-3/+6
| | | | from incorrect source ports.
* Use err(3). Add usage.charnier1997-10-131-19/+24
| | | | | | Use syslog instead of fprintf when being a daemon. Change sprintf to snprintf obtained from OpenBSD. Obtained from: OpenBSD
* Fix minor buffer problems:imp1996-11-011-2/+3
| | | | | | | | Off by one in verify allowed one to march one byte off the end of wd.wd_hostname if wd.wd_hostname had no NUL characters in it. strncpy of myname into mywd used the source buffer's length, rather than the dest.
* When looking for "group daemon" (since that's what's in mtree), make surepeter1996-09-071-4/+7
| | | | | | | | | | we actually look for the *group* and not the user's gid. user daemon has traditionally been group 31 (guest). Also clear out the groups vector so that it doesn't inherit the groups of the invoking user (ever run rwhod by hand before?) Unfortunately, we can't empty the supplemental groups list because the !&@^#! egid is stored in there! :-(
* Run as daemon.daemon, not nobody.daemonpst1996-08-261-1/+1
|
* Fix buffer overrun, and run as nobodypst1996-08-251-9/+49
|
* Here are patches to add full multicast support to rwhod, and an updated manjkh1995-08-171-14/+154
| | | | | | page. I tried all three modes (rwhod, rwhod -m, rwhod -m 32) on a machine with 2 ethernet interfaces and they all worked. Submitted by: Bill Fenner <fenner@parc.xerox.com>
* BSD 4.4 Lite usr.sbin Sourcesrgrimes1994-05-261-0/+539
OpenPOWER on IntegriCloud