123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568 |
- /*
- * Part of Very Secure FTPd
- * License: GPL v2
- * Author: Chris Evans
- * twoprocess.c
- *
- * Code implementing the standard, secure two process security model.
- */
- #include "twoprocess.h"
- #include "privops.h"
- #include "prelogin.h"
- #include "postlogin.h"
- #include "postprivparent.h"
- #include "session.h"
- #include "privsock.h"
- #include "secutil.h"
- #include "filestr.h"
- #include "str.h"
- #include "sysstr.h"
- #include "utility.h"
- #include "tunables.h"
- #include "defs.h"
- #include "parseconf.h"
- #include "ssl.h"
- #include "readwrite.h"
- #include "sysutil.h"
- #include "sysdeputil.h"
- #include "sslslave.h"
- #include "seccompsandbox.h"
- static void drop_all_privs(void);
- static void handle_sigchld(void* duff);
- static void handle_sigterm(void* duff);
- static void process_login_req(struct vsf_session* p_sess);
- static void common_do_login(struct vsf_session* p_sess,
- const struct mystr* p_user_str, int do_chroot,
- int anon);
- static void handle_per_user_config(const struct mystr* p_user_str);
- static void calculate_chdir_dir(int anon, struct mystr* p_userdir_str,
- struct mystr* p_chroot_str,
- struct mystr* p_chdir_str,
- const struct mystr* p_user_str,
- const struct mystr* p_orig_user_str);
- static void
- handle_sigchld(void* duff)
- {
- struct vsf_sysutil_wait_retval wait_retval = vsf_sysutil_wait();
- (void) duff;
- /* Child died, so we'll do the same! Report it as an error unless the child
- * exited normally with zero exit code
- */
- if (vsf_sysutil_retval_is_error(vsf_sysutil_wait_get_retval(&wait_retval)))
- {
- die("waiting for child");
- }
- else if (!vsf_sysutil_wait_exited_normally(&wait_retval))
- {
- die("child died");
- }
- vsf_sysutil_exit(0);
- }
- static void
- handle_sigterm(void* duff)
- {
- (void) duff;
- /* Blow away the connection to make sure no process lingers. */
- vsf_sysutil_shutdown_failok(VSFTP_COMMAND_FD);
- /* Will call the registered exit function to clean up u/wtmp if needed. */
- vsf_sysutil_exit(1);
- }
- void
- vsf_two_process_start(struct vsf_session* p_sess)
- {
- vsf_sysutil_install_sighandler(kVSFSysUtilSigTERM, handle_sigterm, 0, 1);
- /* Overrides the SIGKILL setting set by the standalone listener. */
- vsf_set_term_if_parent_dies();
- /* Create the comms channel between privileged parent and no-priv child */
- priv_sock_init(p_sess);
- if (tunable_ssl_enable)
- {
- /* Create the comms channel between the no-priv SSL child and the low-priv
- * protocol handling child.
- */
- ssl_comm_channel_init(p_sess);
- }
- vsf_sysutil_install_sighandler(kVSFSysUtilSigCHLD, handle_sigchld, 0, 1);
- {
- int newpid;
- if (tunable_isolate_network)
- {
- newpid = vsf_sysutil_fork_newnet();
- }
- else
- {
- newpid = vsf_sysutil_fork();
- }
- if (newpid != 0)
- {
- priv_sock_set_parent_context(p_sess);
- if (tunable_ssl_enable)
- {
- ssl_comm_channel_set_consumer_context(p_sess);
- }
- /* Parent - go into pre-login parent process mode */
- while (1)
- {
- process_login_req(p_sess);
- }
- }
- }
- /* Child process - time to lose as much privilege as possible and do the
- * login processing
- */
- vsf_set_die_if_parent_dies();
- priv_sock_set_child_context(p_sess);
- if (tunable_ssl_enable)
- {
- ssl_comm_channel_set_producer_context(p_sess);
- }
- if (tunable_local_enable && tunable_userlist_enable)
- {
- int retval = -1;
- if (tunable_userlist_file)
- {
- retval = str_fileread(&p_sess->userlist_str, tunable_userlist_file,
- VSFTP_CONF_FILE_MAX);
- }
- if (vsf_sysutil_retval_is_error(retval))
- {
- die2("cannot read user list file:", tunable_userlist_file);
- }
- }
- drop_all_privs();
- seccomp_sandbox_init();
- seccomp_sandbox_setup_prelogin(p_sess);
- seccomp_sandbox_lockdown();
- init_connection(p_sess);
- /* NOTREACHED */
- }
- static void
- drop_all_privs(void)
- {
- struct mystr user_str = INIT_MYSTR;
- struct mystr dir_str = INIT_MYSTR;
- unsigned int option = VSF_SECUTIL_OPTION_CHROOT | VSF_SECUTIL_OPTION_NO_PROCS;
- if (!tunable_ssl_enable)
- {
- /* Unfortunately, can only enable this if we can be sure of not using SSL.
- * In the SSL case, we'll need to receive data transfer file descriptors.
- */
- option |= VSF_SECUTIL_OPTION_NO_FDS;
- }
- if (tunable_nopriv_user)
- {
- str_alloc_text(&user_str, tunable_nopriv_user);
- }
- if (tunable_secure_chroot_dir)
- {
- str_alloc_text(&dir_str, tunable_secure_chroot_dir);
- }
- /* Be kind: give good error message if the secure dir is missing */
- {
- struct vsf_sysutil_statbuf* p_statbuf = 0;
- if (vsf_sysutil_retval_is_error(str_lstat(&dir_str, &p_statbuf)))
- {
- die2("directory given in 'secure_chroot_dir':",
- tunable_secure_chroot_dir);
- }
- vsf_sysutil_free(p_statbuf);
- }
- vsf_secutil_change_credentials(&user_str, &dir_str, 0, 0, option);
- str_free(&user_str);
- str_free(&dir_str);
- }
- void
- vsf_two_process_login(struct vsf_session* p_sess,
- const struct mystr* p_pass_str)
- {
- char result;
- priv_sock_send_cmd(p_sess->child_fd, PRIV_SOCK_LOGIN);
- priv_sock_send_str(p_sess->child_fd, &p_sess->user_str);
- priv_sock_send_str(p_sess->child_fd, p_pass_str);
- priv_sock_send_int(p_sess->child_fd, p_sess->control_use_ssl);
- priv_sock_send_int(p_sess->child_fd, p_sess->data_use_ssl);
- result = priv_sock_get_result(p_sess->child_fd);
- if (result == PRIV_SOCK_RESULT_OK)
- {
- /* Miracle. We don't emit the success message here. That is left to
- * process_post_login().
- * Exit normally, unless we are remaining as the SSL read / write child.
- */
- if (!p_sess->control_use_ssl)
- {
- vsf_sysutil_exit(0);
- }
- else
- {
- ssl_slave(p_sess);
- }
- /* NOTREACHED */
- }
- else if (result == PRIV_SOCK_RESULT_BAD)
- {
- /* Continue the processing loop.. */
- return;
- }
- else
- {
- die("priv_sock_get_result");
- }
- }
- int
- vsf_two_process_get_priv_data_sock(struct vsf_session* p_sess)
- {
- char res;
- unsigned short port = vsf_sysutil_sockaddr_get_port(p_sess->p_port_sockaddr);
- priv_sock_send_cmd(p_sess->child_fd, PRIV_SOCK_GET_DATA_SOCK);
- priv_sock_send_int(p_sess->child_fd, port);
- res = priv_sock_get_result(p_sess->child_fd);
- if (res == PRIV_SOCK_RESULT_BAD)
- {
- return -1;
- }
- else if (res != PRIV_SOCK_RESULT_OK)
- {
- die("could not get privileged socket");
- }
- return priv_sock_recv_fd(p_sess->child_fd);
- }
- void
- vsf_two_process_pasv_cleanup(struct vsf_session* p_sess)
- {
- char res;
- priv_sock_send_cmd(p_sess->child_fd, PRIV_SOCK_PASV_CLEANUP);
- res = priv_sock_get_result(p_sess->child_fd);
- if (res != PRIV_SOCK_RESULT_OK)
- {
- die("could not clean up socket");
- }
- }
- int
- vsf_two_process_pasv_active(struct vsf_session* p_sess)
- {
- priv_sock_send_cmd(p_sess->child_fd, PRIV_SOCK_PASV_ACTIVE);
- return priv_sock_get_int(p_sess->child_fd);
- }
- unsigned short
- vsf_two_process_listen(struct vsf_session* p_sess)
- {
- priv_sock_send_cmd(p_sess->child_fd, PRIV_SOCK_PASV_LISTEN);
- return (unsigned short) priv_sock_get_int(p_sess->child_fd);
- }
- int
- vsf_two_process_get_pasv_fd(struct vsf_session* p_sess)
- {
- char res;
- priv_sock_send_cmd(p_sess->child_fd, PRIV_SOCK_PASV_ACCEPT);
- res = priv_sock_get_result(p_sess->child_fd);
- if (res == PRIV_SOCK_RESULT_BAD)
- {
- return priv_sock_get_int(p_sess->child_fd);
- }
- else if (res != PRIV_SOCK_RESULT_OK)
- {
- die("could not accept on listening socket");
- }
- return priv_sock_recv_fd(p_sess->child_fd);
- }
- void
- vsf_two_process_chown_upload(struct vsf_session* p_sess, int fd)
- {
- char res;
- priv_sock_send_cmd(p_sess->child_fd, PRIV_SOCK_CHOWN);
- priv_sock_send_fd(p_sess->child_fd, fd);
- res = priv_sock_get_result(p_sess->child_fd);
- if (res != PRIV_SOCK_RESULT_OK)
- {
- die("unexpected failure in vsf_two_process_chown_upload");
- }
- }
- static void
- process_login_req(struct vsf_session* p_sess)
- {
- enum EVSFPrivopLoginResult e_login_result = kVSFLoginNull;
- char cmd;
- /* Blocks */
- cmd = priv_sock_get_cmd(p_sess->parent_fd);
- if (cmd != PRIV_SOCK_LOGIN)
- {
- die("bad request");
- }
- /* Get username and password - we must distrust these */
- {
- struct mystr password_str = INIT_MYSTR;
- priv_sock_get_str(p_sess->parent_fd, &p_sess->user_str);
- priv_sock_get_str(p_sess->parent_fd, &password_str);
- p_sess->control_use_ssl = priv_sock_get_int(p_sess->parent_fd);
- p_sess->data_use_ssl = priv_sock_get_int(p_sess->parent_fd);
- if (!tunable_ssl_enable)
- {
- p_sess->control_use_ssl = 0;
- p_sess->data_use_ssl = 0;
- }
- e_login_result = vsf_privop_do_login(p_sess, &password_str);
- str_free(&password_str);
- }
- switch (e_login_result)
- {
- case kVSFLoginFail:
- priv_sock_send_result(p_sess->parent_fd, PRIV_SOCK_RESULT_BAD);
- return;
- break;
- case kVSFLoginAnon:
- str_free(&p_sess->user_str);
- if (tunable_ftp_username)
- {
- str_alloc_text(&p_sess->user_str, tunable_ftp_username);
- }
- common_do_login(p_sess, &p_sess->user_str, 1, 1);
- break;
- case kVSFLoginReal:
- {
- int do_chroot = 0;
- if (tunable_chroot_local_user)
- {
- do_chroot = 1;
- }
- if (tunable_chroot_list_enable)
- {
- struct mystr chroot_list_file = INIT_MYSTR;
- int retval = -1;
- if (tunable_chroot_list_file)
- {
- retval = str_fileread(&chroot_list_file, tunable_chroot_list_file,
- VSFTP_CONF_FILE_MAX);
- }
- if (vsf_sysutil_retval_is_error(retval))
- {
- die2("could not read chroot() list file:",
- tunable_chroot_list_file);
- }
- if (str_contains_line(&chroot_list_file, &p_sess->user_str))
- {
- if (do_chroot)
- {
- do_chroot = 0;
- }
- else
- {
- do_chroot = 1;
- }
- }
- str_free(&chroot_list_file);
- }
- common_do_login(p_sess, &p_sess->user_str, do_chroot, 0);
- }
- break;
- case kVSFLoginNull:
- /* Fall through */
- default:
- bug("weird state in process_login_request");
- break;
- }
- /* NOTREACHED */
- }
- static void
- common_do_login(struct vsf_session* p_sess, const struct mystr* p_user_str,
- int do_chroot, int anon)
- {
- int was_anon = anon;
- const struct mystr* p_orig_user_str = p_user_str;
- int newpid;
- vsf_sysutil_install_null_sighandler(kVSFSysUtilSigCHLD);
- /* Tells the pre-login child all is OK (it may exit in response) */
- priv_sock_send_result(p_sess->parent_fd, PRIV_SOCK_RESULT_OK);
- if (!p_sess->control_use_ssl)
- {
- (void) vsf_sysutil_wait();
- }
- else
- {
- p_sess->ssl_slave_active = 1;
- }
- /* Handle loading per-user config options */
- handle_per_user_config(p_user_str);
- /* Set this before we fork */
- p_sess->is_anonymous = anon;
- priv_sock_close(p_sess);
- priv_sock_init(p_sess);
- vsf_sysutil_install_sighandler(kVSFSysUtilSigCHLD, handle_sigchld, 0, 1);
- if (tunable_isolate_network && !tunable_port_promiscuous)
- {
- newpid = vsf_sysutil_fork_newnet();
- }
- else
- {
- newpid = vsf_sysutil_fork();
- }
- if (newpid == 0)
- {
- struct mystr guest_user_str = INIT_MYSTR;
- struct mystr chroot_str = INIT_MYSTR;
- struct mystr chdir_str = INIT_MYSTR;
- struct mystr userdir_str = INIT_MYSTR;
- unsigned int secutil_option = VSF_SECUTIL_OPTION_USE_GROUPS |
- VSF_SECUTIL_OPTION_NO_PROCS;
- /* Child - drop privs and start proper FTP! */
- /* This PR_SET_PDEATHSIG doesn't work for all possible process tree setups.
- * The other cases are taken care of by a shutdown() of the command
- * connection in our SIGTERM handler.
- */
- vsf_set_die_if_parent_dies();
- priv_sock_set_child_context(p_sess);
- if (tunable_guest_enable && !anon)
- {
- p_sess->is_guest = 1;
- /* Remap to the guest user */
- if (tunable_guest_username)
- {
- str_alloc_text(&guest_user_str, tunable_guest_username);
- }
- p_user_str = &guest_user_str;
- if (!tunable_virtual_use_local_privs)
- {
- anon = 1;
- do_chroot = 1;
- }
- }
- if (do_chroot)
- {
- secutil_option |= VSF_SECUTIL_OPTION_CHROOT;
- }
- if (!anon)
- {
- secutil_option |= VSF_SECUTIL_OPTION_CHANGE_EUID;
- }
- if (!was_anon && tunable_allow_writeable_chroot)
- {
- secutil_option |= VSF_SECUTIL_OPTION_ALLOW_WRITEABLE_ROOT;
- }
- calculate_chdir_dir(was_anon, &userdir_str, &chroot_str, &chdir_str,
- p_user_str, p_orig_user_str);
- vsf_secutil_change_credentials(p_user_str, &userdir_str, &chroot_str,
- 0, secutil_option);
- if (!str_isempty(&chdir_str))
- {
- (void) str_chdir(&chdir_str);
- }
- str_free(&guest_user_str);
- str_free(&chroot_str);
- str_free(&chdir_str);
- str_free(&userdir_str);
- p_sess->is_anonymous = anon;
- seccomp_sandbox_init();
- seccomp_sandbox_setup_postlogin(p_sess);
- seccomp_sandbox_lockdown();
- process_post_login(p_sess);
- bug("should not get here: common_do_login");
- }
- /* Parent */
- priv_sock_set_parent_context(p_sess);
- if (tunable_ssl_enable)
- {
- ssl_comm_channel_set_producer_context(p_sess);
- }
- /* The seccomp sandbox lockdown for the priv parent is done inside here */
- vsf_priv_parent_postlogin(p_sess);
- bug("should not get here in common_do_login");
- }
- static void
- handle_per_user_config(const struct mystr* p_user_str)
- {
- struct mystr filename_str = INIT_MYSTR;
- struct vsf_sysutil_statbuf* p_statbuf = 0;
- struct str_locate_result loc_result;
- int retval;
- if (!tunable_user_config_dir)
- {
- return;
- }
- /* Security paranoia - ignore if user has a / in it. */
- loc_result = str_locate_char(p_user_str, '/');
- if (loc_result.found)
- {
- return;
- }
- str_alloc_text(&filename_str, tunable_user_config_dir);
- str_append_char(&filename_str, '/');
- str_append_str(&filename_str, p_user_str);
- retval = str_stat(&filename_str, &p_statbuf);
- if (!vsf_sysutil_retval_is_error(retval))
- {
- /* Security - file ownership check now in vsf_parseconf_load_file() */
- vsf_parseconf_load_file(str_getbuf(&filename_str), 1);
- }
- else if (vsf_sysutil_get_error() != kVSFSysUtilErrNOENT)
- {
- die("error opening per-user config file");
- }
- str_free(&filename_str);
- vsf_sysutil_free(p_statbuf);
- }
- static void
- calculate_chdir_dir(int anon_login, struct mystr* p_userdir_str,
- struct mystr* p_chroot_str,
- struct mystr* p_chdir_str,
- const struct mystr* p_user_str,
- const struct mystr* p_orig_user_str)
- {
- if (!anon_login)
- {
- const struct vsf_sysutil_user* p_user = str_getpwnam(p_user_str);
- if (p_user == 0)
- {
- die2("cannot locate user entry:", str_getbuf(p_user_str));
- }
- str_alloc_text(p_userdir_str, vsf_sysutil_user_get_homedir(p_user));
- if (tunable_user_sub_token)
- {
- str_replace_text(p_userdir_str, tunable_user_sub_token,
- str_getbuf(p_orig_user_str));
- }
- }
- if (anon_login && tunable_anon_root)
- {
- str_alloc_text(p_chroot_str, tunable_anon_root);
- }
- else if (!anon_login && tunable_local_root)
- {
- str_alloc_text(p_chroot_str, tunable_local_root);
- if (tunable_user_sub_token)
- {
- str_replace_text(p_chroot_str, tunable_user_sub_token,
- str_getbuf(p_orig_user_str));
- }
- }
- /* If enabled, the chroot() location embedded in the HOMEDIR takes
- * precedence.
- */
- if (!anon_login && tunable_passwd_chroot_enable)
- {
- struct str_locate_result loc_result;
- loc_result = str_locate_text(p_userdir_str, "/./");
- if (loc_result.found)
- {
- str_split_text(p_userdir_str, p_chdir_str, "/./");
- str_copy(p_chroot_str, p_userdir_str);
- }
- }
- }
|