GCC Code Coverage Report
Directory: ./ Exec Total Coverage
File: usr.sbin/ldapd/ldapd.c Lines: 75 207 36.2 %
Date: 2017-11-07 Branches: 26 112 23.2 %

Line Branch Exec Source
1
/*	$OpenBSD: ldapd.c,v 1.23 2017/03/01 00:50:12 gsoares Exp $ */
2
3
/*
4
 * Copyright (c) 2009, 2010 Martin Hedenfalk <martin@bzero.se>
5
 *
6
 * Permission to use, copy, modify, and distribute this software for any
7
 * purpose with or without fee is hereby granted, provided that the above
8
 * copyright notice and this permission notice appear in all copies.
9
 *
10
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13
 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15
 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16
 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17
 */
18
19
#include <sys/queue.h>
20
#include <sys/stat.h>
21
#include <sys/un.h>
22
#include <sys/types.h>
23
#include <sys/wait.h>
24
25
#include <assert.h>
26
#include <bsd_auth.h>
27
#include <ctype.h>
28
#include <err.h>
29
#include <errno.h>
30
#include <event.h>
31
#include <fcntl.h>
32
#include <login_cap.h>
33
#include <signal.h>
34
#include <stdio.h>
35
#include <stdlib.h>
36
#include <string.h>
37
#include <time.h>
38
#include <unistd.h>
39
40
#include "ldapd.h"
41
#include "log.h"
42
43
void		 usage(void);
44
void		 ldapd_sig_handler(int fd, short why, void *data);
45
void		 ldapd_sigchld_handler(int sig, short why, void *data);
46
static void	 ldapd_imsgev(struct imsgev *iev, int code, struct imsg *imsg);
47
static void	 ldapd_needfd(struct imsgev *iev);
48
static void	 ldapd_auth_request(struct imsgev *iev, struct imsg *imsg);
49
static void	 ldapd_open_request(struct imsgev *iev, struct imsg *imsg);
50
static void	 ldapd_log_verbose(struct imsg *imsg);
51
static void	 ldapd_cleanup(char *);
52
static pid_t	 start_child(enum ldapd_process, char *, int, int, int,
53
		    char *, char *);
54
55
struct ldapd_stats	 stats;
56
pid_t			 ldape_pid;
57
const char		*datadir = DATADIR;
58
59
void
60
usage(void)
61
{
62
	extern char	*__progname;
63
64
	fprintf(stderr, "usage: %s [-dnv] [-D macro=value] "
65
	    "[-f file] [-r directory] [-s file]\n", __progname);
66
	exit(1);
67
}
68
69
void
70
ldapd_sig_handler(int sig, short why, void *data)
71
{
72
40
	log_info("ldapd: got signal %d", sig);
73
20
	if (sig == SIGINT || sig == SIGTERM)
74
20
		event_loopexit(NULL);
75
20
}
76
77
void
78
ldapd_sigchld_handler(int sig, short why, void *data)
79
{
80
	pid_t		 pid;
81
	int		 status;
82
83
	while ((pid = waitpid(WAIT_ANY, &status, WNOHANG)) != 0) {
84
		if (pid == -1) {
85
			if (errno == EINTR)
86
				continue;
87
			if (errno != ECHILD)
88
				log_warn("waitpid");
89
			break;
90
		}
91
92
		if (WIFEXITED(status))
93
			log_debug("child %d exited with status %d",
94
			    pid, WEXITSTATUS(status));
95
		else if (WIFSIGNALED(status))
96
			log_debug("child %d exited due to signal %d",
97
			    pid, WTERMSIG(status));
98
		else
99
			log_debug("child %d terminated abnormally", pid);
100
101
		if (pid == ldape_pid) {
102
			log_info("ldapd: lost ldap server");
103
			event_loopexit(NULL);
104
			break;
105
		}
106
	}
107
}
108
109
int
110
main(int argc, char *argv[])
111
{
112
	int			 c;
113
	int			 debug = 0, verbose = 0, eflag = 0;
114
	int			 configtest = 0;
115
96
	int			 pipe_parent2ldap[2];
116
	char			*conffile = CONFFILE;
117
	char			*csockpath = LDAPD_SOCKET;
118
	char			*saved_argv0;
119
	struct imsgev		*iev_ldape;
120
48
	struct event		 ev_sigint;
121
48
	struct event		 ev_sigterm;
122
48
	struct event		 ev_sigchld;
123
48
	struct event		 ev_sighup;
124
48
	struct stat		 sb;
125
126
48
	log_init(1);		/* log to stderr until daemonized */
127
128
48
	saved_argv0 = argv[0];
129
48
	if (saved_argv0 == NULL)
130
		saved_argv0 = "ldapd";
131
132
280
	while ((c = getopt(argc, argv, "dhvD:f:nr:s:E")) != -1) {
133
134


184
		switch (c) {
135
		case 'd':
136
			debug = 1;
137
20
			break;
138
		case 'D':
139
			if (cmdline_symset(optarg) < 0) {
140
				warnx("could not parse macro definition %s",
141
				    optarg);
142
			}
143
			break;
144
		case 'f':
145
48
			conffile = optarg;
146
48
			break;
147
		case 'h':
148
			usage();
149
			/* NOTREACHED */
150
		case 'n':
151
			configtest = 1;
152
28
			break;
153
		case 'r':
154
48
			datadir = optarg;
155
48
			break;
156
		case 's':
157
			csockpath = optarg;
158
			break;
159
		case 'v':
160
40
			verbose++;
161
40
			break;
162
		case 'E':
163
			eflag = 1;
164
			break;
165
		default:
166
			usage();
167
			/* NOTREACHED */
168
		}
169
	}
170
171
48
	argc -= optind;
172
48
	if (argc > 0)
173
		usage();
174
175
	/* check for root privileges  */
176
48
	if (geteuid())
177
		errx(1, "need root privileges");
178
179
	/* check for ldapd user */
180
48
	if (getpwnam(LDAPD_USER) == NULL)
181
		errx(1, "unknown user %s", LDAPD_USER);
182
183
48
	log_verbose(verbose);
184
48
	stats.started_at = time(0);
185
48
	tls_init();
186
187
48
	if (parse_config(conffile) != 0)
188
		exit(2);
189
190
48
	if (configtest) {
191
		fprintf(stderr, "configuration ok\n");
192
		exit(0);
193
	}
194
195
20
	if (eflag)
196
		ldape(debug, verbose, csockpath);
197
198
20
	if (stat(datadir, &sb) == -1)
199
		err(1, "%s", datadir);
200
20
	if (!S_ISDIR(sb.st_mode))
201
		errx(1, "%s is not a directory", datadir);
202
203
20
	if (!debug) {
204
		if (daemon(1, 0) == -1)
205
			err(1, "failed to daemonize");
206
	}
207
208
20
	log_init(debug);
209
20
	log_info("startup");
210
211
40
	if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK,
212
40
	    PF_UNSPEC, pipe_parent2ldap) != 0)
213
		fatal("socketpair");
214
215
20
	ldape_pid = start_child(PROC_LDAP_SERVER, saved_argv0,
216
20
	    pipe_parent2ldap[1], debug, verbose, csockpath, conffile);
217
218
20
	setproctitle("auth");
219
20
	event_init();
220
221
20
	signal_set(&ev_sigint, SIGINT, ldapd_sig_handler, NULL);
222
20
	signal_set(&ev_sigterm, SIGTERM, ldapd_sig_handler, NULL);
223
20
	signal_set(&ev_sigchld, SIGCHLD, ldapd_sigchld_handler, NULL);
224
20
	signal_set(&ev_sighup, SIGHUP, ldapd_sig_handler, NULL);
225
20
	signal_add(&ev_sigint, NULL);
226
20
	signal_add(&ev_sigterm, NULL);
227
20
	signal_add(&ev_sigchld, NULL);
228
20
	signal_add(&ev_sighup, NULL);
229
20
	signal(SIGPIPE, SIG_IGN);
230
231
20
	if ((iev_ldape = calloc(1, sizeof(struct imsgev))) == NULL)
232
		fatal("calloc");
233
20
	imsgev_init(iev_ldape, pipe_parent2ldap[0], NULL, ldapd_imsgev,
234
	    ldapd_needfd);
235
236
40
	if (pledge("stdio flock rpath wpath cpath getpw sendfd proc exec",
237
20
	    NULL) == -1)
238
		err(1, "pledge");
239
240
20
	event_dispatch();
241
242
20
	ldapd_cleanup(csockpath);
243
20
	log_debug("ldapd: exiting");
244
245
20
	return 0;
246
20
}
247
248
static void
249
ldapd_cleanup(char * csockpath)
250
{
251
	struct listener		*l;
252
	struct sockaddr_un	*sun = NULL;
253
254
	/* Remove control socket. */
255
40
	(void)unlink(csockpath);
256
257
	/* Remove unix listening sockets. */
258
320
	TAILQ_FOREACH(l, &conf->listeners, entry) {
259
140
		if (l->ss.ss_family == AF_UNIX) {
260
20
			sun = (struct sockaddr_un *)&l->ss;
261
20
			log_info("ldapd: removing unix socket %s", sun->sun_path);
262
20
			(void)unlink(sun->sun_path);
263
20
		}
264
	}
265
20
}
266
267
static void
268
ldapd_imsgev(struct imsgev *iev, int code, struct imsg *imsg)
269
{
270
	switch (code) {
271
	case IMSGEV_IMSG:
272
		log_debug("%s: got imsg %d on fd %d",
273
		    __func__, imsg->hdr.type, iev->ibuf.fd);
274
		switch (imsg->hdr.type) {
275
		case IMSG_LDAPD_AUTH:
276
			ldapd_auth_request(iev, imsg);
277
			break;
278
		case IMSG_CTL_LOG_VERBOSE:
279
			ldapd_log_verbose(imsg);
280
			break;
281
		case IMSG_LDAPD_OPEN:
282
			ldapd_open_request(iev, imsg);
283
			break;
284
		default:
285
			log_debug("%s: unexpected imsg %d",
286
			    __func__, imsg->hdr.type);
287
			break;
288
		}
289
		break;
290
	case IMSGEV_EREAD:
291
	case IMSGEV_EWRITE:
292
	case IMSGEV_EIMSG:
293
		fatal("imsgev read/write error");
294
		break;
295
	case IMSGEV_DONE:
296
		event_loopexit(NULL);
297
		break;
298
	}
299
}
300
301
static void
302
ldapd_needfd(struct imsgev *iev)
303
{
304
	fatal("should never need an fd for parent messages");
305
}
306
307
static int
308
ldapd_auth_classful(char *name, char *password)
309
{
310
	login_cap_t		*lc = NULL;
311
	char			*class = NULL, *style = NULL;
312
	auth_session_t		*as;
313
314
	if ((class = strchr(name, '#')) == NULL) {
315
		log_debug("regular auth");
316
		return auth_userokay(name, NULL, "auth-ldap", password);
317
	}
318
	*class++ = '\0';
319
320
	if ((lc = login_getclass(class)) == NULL) {
321
		log_debug("login_getclass(%s) for [%s] failed", class, name);
322
		return 0;
323
	}
324
	if ((style = login_getstyle(lc, style, "auth-ldap")) == NULL) {
325
		log_debug("login_getstyle() for [%s] failed", name);
326
		login_close(lc);
327
		return 0;
328
	}
329
	if (password) {
330
		if ((as = auth_open()) == NULL) {
331
			login_close(lc);
332
			return 0;
333
		}
334
		auth_setitem(as, AUTHV_SERVICE, "response");
335
		auth_setdata(as, "", 1);
336
		auth_setdata(as, password, strlen(password) + 1);
337
		explicit_bzero(password, strlen(password));
338
	} else
339
		as = NULL;
340
341
	as = auth_verify(as, style, name, lc->lc_class, (char *)NULL);
342
	login_close(lc);
343
	return (as != NULL ? auth_close(as) : 0);
344
}
345
346
static void
347
ldapd_auth_request(struct imsgev *iev, struct imsg *imsg)
348
{
349
	struct auth_req		*areq = imsg->data;
350
	struct auth_res		 ares;
351
352
	if (imsg->hdr.len != sizeof(*areq) + IMSG_HEADER_SIZE)
353
		fatal("invalid size of auth request");
354
355
	/* make sure name and password are null-terminated */
356
	areq->name[sizeof(areq->name) - 1] = '\0';
357
	areq->password[sizeof(areq->password) - 1] = '\0';
358
359
	log_debug("authenticating [%s]", areq->name);
360
	ares.ok = ldapd_auth_classful(areq->name, areq->password);
361
	ares.fd = areq->fd;
362
	ares.msgid = areq->msgid;
363
	memset(areq, 0, sizeof(*areq));
364
	imsgev_compose(iev, IMSG_LDAPD_AUTH_RESULT, 0, 0, -1, &ares,
365
	    sizeof(ares));
366
}
367
368
static void
369
ldapd_log_verbose(struct imsg *imsg)
370
{
371
	int	 verbose;
372
373
	if (imsg->hdr.len != sizeof(verbose) + IMSG_HEADER_SIZE)
374
		fatal("invalid size of log verbose request");
375
376
	bcopy(imsg->data, &verbose, sizeof(verbose));
377
	log_verbose(verbose);
378
}
379
380
static void
381
ldapd_open_request(struct imsgev *iev, struct imsg *imsg)
382
{
383
	struct open_req		*oreq = imsg->data;
384
	int			 oflags, fd;
385
386
	if (imsg->hdr.len != sizeof(*oreq) + IMSG_HEADER_SIZE)
387
		fatal("invalid size of open request");
388
389
	/* make sure path is null-terminated */
390
	oreq->path[PATH_MAX] = '\0';
391
392
	if (strncmp(oreq->path, datadir, strlen(datadir)) != 0) {
393
		log_warnx("refusing to open file %s", oreq->path);
394
		fatal("ldape sent invalid open request");
395
	}
396
397
	if (oreq->rdonly)
398
		oflags = O_RDONLY;
399
	else
400
		oflags = O_RDWR | O_CREAT | O_APPEND;
401
402
	log_debug("opening [%s]", oreq->path);
403
	fd = open(oreq->path, oflags | O_NOFOLLOW, 0600);
404
	if (fd == -1)
405
		log_warn("%s", oreq->path);
406
407
	imsgev_compose(iev, IMSG_LDAPD_OPEN_RESULT, 0, 0, fd, oreq,
408
	    sizeof(*oreq));
409
}
410
411
static pid_t
412
start_child(enum ldapd_process p, char *argv0, int fd, int debug,
413
    int verbose, char *csockpath, char *conffile)
414
{
415
40
	char		*argv[9];
416
	int		 argc = 0;
417
	pid_t		 pid;
418
419
20
	switch (pid = fork()) {
420
	case -1:
421
		fatal("cannot fork");
422
	case 0:
423
		break;
424
	default:
425
20
		close(fd);
426
20
		return (pid);
427
	}
428
429
	if (dup2(fd, PROC_PARENT_SOCK_FILENO) == -1)
430
		fatal("cannot setup imsg fd");
431
432
	argv[argc++] = argv0;
433
	switch (p) {
434
	case PROC_MAIN_AUTH:
435
		fatalx("Can not start main process");
436
	case PROC_LDAP_SERVER:
437
		argv[argc++] = "-E";
438
		break;
439
	}
440
	if (debug)
441
		argv[argc++] = "-d";
442
	if (verbose)
443
		argv[argc++] = "-v";
444
	if (csockpath) {
445
		argv[argc++] = "-s";
446
		argv[argc++] = csockpath;
447
	}
448
	if (conffile) {
449
		argv[argc++] = "-f";
450
		argv[argc++] = conffile;
451
	}
452
453
	argv[argc++] = NULL;
454
455
	execvp(argv0, argv);
456
	fatal("execvp");
457
20
}