2 conf.c -- configuration code
3 Copyright (C) 1998 Robert van der Meulen
4 Copyright (C) 1998,1999,2000 Ivo Timmermans <itimmermans@bigfoot.com>
5 2000 Guus Sliepen <guus@sliepen.warande.net>
6 2000 Cris van Pelt <tribbel@arise.dhs.org>
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22 $Id: conf.c,v 1.9.4.27 2000/11/30 00:24:13 zarq Exp $
36 #include <sys/types.h>
40 #include <utils.h> /* for cp */
43 #include "netutl.h" /* for strtoip */
47 config_t *config = NULL;
49 int timeout = 0; /* seconds before timeout */
50 char *confbase = NULL; /* directory in which all config files are */
51 char *netname = NULL; /* name of the vpn network */
53 /* Will be set if HUP signal is received. It will be processed when it is safe. */
57 These are all the possible configurable values
59 static internal_config_t hazahaza[] = {
60 /* Main configuration file keywords */
61 { "Name", config_name, TYPE_NAME },
62 { "ConnectTo", config_connectto, TYPE_NAME },
63 { "PingTimeout", config_pingtimeout, TYPE_INT },
64 { "TapDevice", config_tapdevice, TYPE_NAME },
65 { "PrivateKey", config_privatekey, TYPE_NAME },
66 { "KeyExpire", config_keyexpire, TYPE_INT },
67 { "Hostnames", config_hostnames, TYPE_BOOL },
68 { "Interface", config_interface, TYPE_NAME },
69 { "InterfaceIP", config_interfaceip, TYPE_IP },
70 /* Host configuration file keywords */
71 { "Address", config_address, TYPE_NAME },
72 { "Port", config_port, TYPE_INT },
73 { "PublicKey", config_publickey, TYPE_NAME },
74 { "Subnet", config_subnet, TYPE_IP }, /* Use IPv4 subnets only for now */
75 { "RestrictHosts", config_restricthosts, TYPE_BOOL },
76 { "RestrictSubnets", config_restrictsubnets, TYPE_BOOL },
77 { "RestrictAddress", config_restrictaddress, TYPE_BOOL },
78 { "RestrictPort", config_restrictport, TYPE_BOOL },
79 { "IndirectData", config_indirectdata, TYPE_BOOL },
80 { "TCPonly", config_tcponly, TYPE_BOOL },
85 Add given value to the list of configs cfg
88 add_config_val(config_t **cfg, int argtype, char *val)
93 p = (config_t*)xmalloc(sizeof(*p));
99 p->data.val = strtol(val, &q, 0);
104 p->data.ptr = xmalloc(strlen(val) + 1);
105 strcpy(p->data.ptr, val);
108 p->data.ip = strtoip(val);
111 if(!strcasecmp("yes", val))
112 p->data.val = stupid_true;
113 else if(!strcasecmp("no", val))
114 p->data.val = stupid_false;
119 p->argtype = argtype;
137 Read exactly one line and strip the trailing newline if any. If the
138 file was on EOF, return NULL. Otherwise, return all the data in a
139 dynamically allocated buffer.
141 char *readline(FILE *fp)
143 char *newline = NULL;
145 char *line; /* The array that contains everything that has been read
147 char *idx; /* Read into this pointer, which points to an offset
149 size_t size, newsize; /* The size of the current array pointed to by
151 size_t maxlen; /* Maximum number of characters that may be read with
152 fgets. This is newsize - oldsize. */
159 line = xmalloc(size);
164 p = fgets(idx, maxlen, fp);
165 if(p == NULL) /* EOF or error */
170 /* otherwise: error; let the calling function print an error
171 message if applicable */
176 newline = strchr(p, '\n');
178 /* We haven't yet read everything to the end of the line */
181 line = xrealloc(line, newsize);
182 idx = &line[size - 1];
183 maxlen = newsize - size + 1;
188 *newline = '\0'; /* kill newline */
197 Parse a configuration file and put the results in the configuration tree
200 int read_config_file(config_t **base, const char *fname)
209 if((fp = fopen (fname, "r")) == NULL)
214 if((line = readline(fp)) == NULL)
222 if((p = strtok(line, "\t =")) == NULL)
223 continue; /* no tokens on this line */
226 continue; /* comment: ignore */
228 for(i = 0; hazahaza[i].name != NULL; i++)
229 if(!strcasecmp(hazahaza[i].name, p))
232 if(!hazahaza[i].name)
234 syslog(LOG_ERR, _("Invalid variable name on line %d while reading config file %s"),
239 if(((q = strtok(NULL, "\t\n\r =")) == NULL) || q[0] == '#')
241 fprintf(stderr, _("No value for variable on line %d while reading config file %s"),
246 cfg = add_config_val(base, hazahaza[i].argtype, q);
249 fprintf(stderr, _("Invalid value for variable on line %d while reading config file %s"),
254 cfg->which = hazahaza[i].which;
266 int read_server_config()
271 asprintf(&fname, "%s/tinc.conf", confbase);
272 x = read_config_file(&config, fname);
275 fprintf(stderr, _("Failed to read `%s': %m\n"),
284 Look up the value of the config option type
286 const config_t *get_config_val(config_t *p, which_t type)
289 for(; p != NULL; p = p->next)
297 Remove the complete configuration tree.
299 void clear_config(config_t **base)
303 for(p = *base; p != NULL; p = next)
306 if(p->data.ptr && (p->argtype == TYPE_NAME))
316 int isadir(const char* f)
322 fprintf(stderr, _("Couldn't stat `%s': %m\n"),
327 return S_ISDIR(s.st_mode);
330 int is_safe_path(const char *file)
333 char *fn = xstrdup(file);
336 p = strrchr(file, '/');
337 assert(p); /* p has to contain a / */
339 if(stat(file, &s) < 0)
341 fprintf(stderr, _("Couldn't stat `%s': %m\n"),
345 if(s.st_uid != geteuid())
347 fprintf(stderr, _("`%s' is owned by UID %d instead of %d.\n"),
348 file, s.st_uid, geteuid());
351 if(S_ISLNK(s.st_mode))
353 fprintf(stderr, _("Warning: `%s' is a symlink\n"),
355 /* fixme: read the symlink and start again */
359 if(stat(file, &s) < 0)
361 fprintf(stderr, _("Couldn't stat `%s': %m\n"),
365 if(s.st_uid != geteuid())
367 fprintf(stderr, _("`%s' is owned by UID %d instead of %d.\n"),
368 file, s.st_uid, geteuid());
371 if(S_ISLNK(s.st_mode))
373 fprintf(stderr, _("Warning: `%s' is a symlink\n"),
375 /* fixme: read the symlink and start again */
379 /* Accessible by others */
380 fprintf(stderr, _("`%s' has unsecure permissions.\n"),
388 FILE *ask_and_safe_open(const char* filename, const char* what)
395 /* Check stdin and stdout */
396 if(!isatty(0) || !isatty(1))
398 /* Argh, they are running us from a script or something. Write
399 the files to the current directory and let them burn in hell
401 fn = xstrdup(filename);
405 /* Ask for a file and/or directory name. */
406 fprintf(stdout, _("Please enter a file to save %s to [%s]: "),
408 fflush(stdout); /* Don't wait for a newline */
409 if((fn = readline(stdin)) == NULL)
411 fprintf(stderr, _("Error while reading stdin: %m\n"));
415 /* User just pressed enter. */
416 fn = xstrdup(filename);
419 if((strchr(fn, '/') == NULL) || (fn[0] != '/'))
421 /* The directory is a relative path or a filename. */
424 directory = get_current_dir_name();
425 len = strlen(fn) + strlen(directory) + 2; /* 1 for the / */
427 snprintf(p, len, "%s/%s", directory, fn);
433 if(isadir(fn) > 0) /* -1 is error */
437 len = strlen(fn) + strlen(filename) + 2; /* 1 for the / */
439 snprintf(p, len, "%s/%s", fn, filename);
444 umask(0077); /* Disallow everything for group and other */
446 /* Open it first to keep the inode busy */
447 if((r = fopen(fn, "w")) == NULL)
449 fprintf(stderr, _("Error opening file `%s': %m\n"),
455 /* Then check the file for nasty attacks */
456 if(!is_safe_path(fn)) /* Do not permit any directories that are
457 readable or writeable by other users. */
459 fprintf(stderr, _("The file `%s' (or any of the leading directories) has unsafe permissions.\n"
460 "I will not create or overwrite this file.\n"),