b9f9f4f47f140b4b7df57817fc531adcfe07553a
[tinc] / src / tincd.c
1 /*
2     tincd.c -- the main file for tincd
3     Copyright (C) 1998-2003 Ivo Timmermans <ivo@o2w.nl>
4                   2000-2003 Guus Sliepen <guus@sliepen.eu.org>
5
6     This program is free software; you can redistribute it and/or modify
7     it under the terms of the GNU General Public License as published by
8     the Free Software Foundation; either version 2 of the License, or
9     (at your option) any later version.
10
11     This program is distributed in the hope that it will be useful,
12     but WITHOUT ANY WARRANTY; without even the implied warranty of
13     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14     GNU General Public License for more details.
15
16     You should have received a copy of the GNU General Public License
17     along with this program; if not, write to the Free Software
18     Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19
20     $Id: tincd.c,v 1.10.4.76 2003/07/22 20:55:20 guus Exp $
21 */
22
23 #include "system.h"
24
25 /* Darwin (MacOS/X) needs the following definition... */
26 #ifndef _P1003_1B_VISIBLE
27 #define _P1003_1B_VISIBLE
28 #endif
29
30 #ifdef HAVE_SYS_MMAN_H
31 #include <sys/mman.h>
32 #endif
33
34 #include <openssl/rand.h>
35 #include <openssl/rsa.h>
36 #include <openssl/pem.h>
37 #include <openssl/evp.h>
38
39 #include <lzo1x.h>
40
41 #include "conf.h"
42 #include "logger.h"
43 #include "net.h"
44 #include "netutl.h"
45 #include "process.h"
46 #include "protocol.h"
47 #include "utils.h"
48 #include "xalloc.h"
49
50 /* The name this program was run with. */
51 char *program_name = NULL;
52
53 /* If nonzero, display usage information and exit. */
54 bool show_help = false;
55
56 /* If nonzero, print the version on standard output and exit.  */
57 bool show_version = false;
58
59 /* If nonzero, it will attempt to kill a running tincd and exit. */
60 int kill_tincd = 0;
61
62 /* If nonzero, generate public/private keypair for this host/net. */
63 int generate_keys = 0;
64
65 /* If nonzero, use null ciphers and skip all key exchanges. */
66 bool bypass_security = false;
67
68 /* If nonzero, disable swapping for this process. */
69 bool do_mlock = false;
70
71 /* If nonzero, write log entries to a separate file. */
72 bool use_logfile = false;
73
74 char *identname = NULL;                         /* program name for syslog */
75 char *pidfilename = NULL;                       /* pid file location */
76 char *logfilename = NULL;                       /* log file location */
77 char **g_argv;                                  /* a copy of the cmdline arguments */
78 char **environment;                             /* A pointer to the environment on startup */
79
80 static struct option const long_options[] = {
81         {"config", required_argument, NULL, 'c'},
82         {"kill", optional_argument, NULL, 'k'},
83         {"net", required_argument, NULL, 'n'},
84         {"help", no_argument, NULL, 1},
85         {"version", no_argument, NULL, 2},
86         {"no-detach", no_argument, NULL, 'D'},
87         {"generate-keys", optional_argument, NULL, 'K'},
88         {"debug", optional_argument, NULL, 'd'},
89         {"bypass-security", no_argument, NULL, 3},
90         {"mlock", no_argument, NULL, 'L'},
91         {"logfile", optional_argument, NULL, 4},
92         {"pidfile", required_argument, NULL, 5},
93         {NULL, 0, NULL, 0}
94 };
95
96 static void usage(bool status)
97 {
98         if(status)
99                 fprintf(stderr, _("Try `%s --help\' for more information.\n"),
100                                 program_name);
101         else {
102                 printf(_("Usage: %s [option]...\n\n"), program_name);
103                 printf(_("  -c, --config=DIR           Read configuration options from DIR.\n"
104                                 "  -D, --no-detach            Don't fork and detach.\n"
105                                 "  -d, --debug[=LEVEL]        Increase debug level or set it to LEVEL.\n"
106                                 "  -k, --kill[=SIGNAL]        Attempt to kill a running tincd and exit.\n"
107                                 "  -n, --net=NETNAME          Connect to net NETNAME.\n"
108                                 "  -K, --generate-keys[=BITS] Generate public/private RSA keypair.\n"
109                                 "  -L, --mlock                Lock tinc into main memory.\n"
110                                 "      --logfile[=FILENAME]   Write log entries to a logfile.\n"
111                                 "      --pidfile=FILENAME     Write PID to FILENAME.\n"
112                                 "      --help                 Display this help and exit.\n"
113                                 "      --version              Output version information and exit.\n\n"));
114                 printf(_("Report bugs to tinc@nl.linux.org.\n"));
115         }
116
117         exit(status);
118 }
119
120 static void parse_options(int argc, char **argv, char **envp)
121 {
122         int r;
123         int option_index = 0;
124
125         while((r = getopt_long(argc, argv, "c:DLd::k::n:K::", long_options, &option_index)) != EOF) {
126                 switch (r) {
127                         case 0:                         /* long option */
128                                 break;
129
130                         case 'c':                               /* config file */
131                                 confbase = xstrdup(optarg);
132                                 break;
133
134                         case 'D':                               /* no detach */
135                                 do_detach = false;
136                                 break;
137
138                         case 'L':                               /* no detach */
139                                 do_mlock = true;
140                                 break;
141
142                         case 'd':                               /* inc debug level */
143                                 if(optarg)
144                                         debug_level = atoi(optarg);
145                                 else
146                                         debug_level++;
147                                 break;
148
149                         case 'k':                               /* kill old tincds */
150                                 if(optarg) {
151                                         if(!strcasecmp(optarg, "HUP"))
152                                                 kill_tincd = SIGHUP;
153                                         else if(!strcasecmp(optarg, "TERM"))
154                                                 kill_tincd = SIGTERM;
155                                         else if(!strcasecmp(optarg, "KILL"))
156                                                 kill_tincd = SIGKILL;
157                                         else if(!strcasecmp(optarg, "USR1"))
158                                                 kill_tincd = SIGUSR1;
159                                         else if(!strcasecmp(optarg, "USR2"))
160                                                 kill_tincd = SIGUSR2;
161                                         else if(!strcasecmp(optarg, "WINCH"))
162                                                 kill_tincd = SIGWINCH;
163                                         else if(!strcasecmp(optarg, "INT"))
164                                                 kill_tincd = SIGINT;
165                                         else if(!strcasecmp(optarg, "ALRM"))
166                                                 kill_tincd = SIGALRM;
167                                         else {
168                                                 kill_tincd = atoi(optarg);
169
170                                                 if(!kill_tincd) {
171                                                         fprintf(stderr, _("Invalid argument `%s'; SIGNAL must be a number or one of HUP, TERM, KILL, USR1, USR2, WINCH, INT or ALRM.\n"),
172                                                                         optarg);
173                                                         usage(true);
174                                                 }
175                                         }
176                                 } else
177                                         kill_tincd = SIGTERM;
178                                 break;
179
180                         case 'n':                               /* net name given */
181                                 netname = xstrdup(optarg);
182                                 break;
183
184                         case 'K':                               /* generate public/private keypair */
185                                 if(optarg) {
186                                         generate_keys = atoi(optarg);
187
188                                         if(generate_keys < 512) {
189                                                 fprintf(stderr, _("Invalid argument `%s'; BITS must be a number equal to or greater than 512.\n"),
190                                                                 optarg);
191                                                 usage(true);
192                                         }
193
194                                         generate_keys &= ~7;    /* Round it to bytes */
195                                 } else
196                                         generate_keys = 1024;
197                                 break;
198
199                         case 1:                                 /* show help */
200                                 show_help = true;
201                                 break;
202
203                         case 2:                                 /* show version */
204                                 show_version = true;
205                                 break;
206
207                         case 3:                                 /* bypass security */
208                                 bypass_security = true;
209                                 break;
210
211                         case 4:                                 /* write log entries to a file */
212                                 use_logfile = true;
213                                 if(optarg)
214                                         logfilename = xstrdup(optarg);
215                                 break;
216
217                         case 5:                                 /* write PID to a file */
218                                 pidfilename = xstrdup(optarg);
219                                 break;
220
221                         case '?':
222                                 usage(true);
223
224                         default:
225                                 break;
226                 }
227         }
228 }
229
230 /* This function prettyprints the key generation process */
231
232 static void indicator(int a, int b, void *p)
233 {
234         switch (a) {
235                 case 0:
236                         fprintf(stderr, ".");
237                         break;
238
239                 case 1:
240                         fprintf(stderr, "+");
241                         break;
242
243                 case 2:
244                         fprintf(stderr, "-");
245                         break;
246
247                 case 3:
248                         switch (b) {
249                                 case 0:
250                                         fprintf(stderr, " p\n");
251                                         break;
252
253                                 case 1:
254                                         fprintf(stderr, " q\n");
255                                         break;
256
257                                 default:
258                                         fprintf(stderr, "?");
259                         }
260                         break;
261
262                 default:
263                         fprintf(stderr, "?");
264         }
265 }
266
267 /*
268   Generate a public/private RSA keypair, and ask for a file to store
269   them in.
270 */
271 static bool keygen(int bits)
272 {
273         RSA *rsa_key;
274         FILE *f;
275         char *name = NULL;
276         char *filename;
277
278         fprintf(stderr, _("Generating %d bits keys:\n"), bits);
279         rsa_key = RSA_generate_key(bits, 0xFFFF, indicator, NULL);
280
281         if(!rsa_key) {
282                 fprintf(stderr, _("Error during key generation!\n"));
283                 return false;
284         } else
285                 fprintf(stderr, _("Done.\n"));
286
287         asprintf(&filename, "%s/rsa_key.priv", confbase);
288         f = ask_and_safe_open(filename, _("private RSA key"), true, "a");
289
290         if(!f)
291                 return false;
292
293         if(ftell(f))
294                 fprintf(stderr, _("Appending key to existing contents.\nMake sure only one key is stored in the file.\n"));
295
296         PEM_write_RSAPrivateKey(f, rsa_key, NULL, NULL, 0, NULL, NULL);
297         fclose(f);
298         free(filename);
299
300         get_config_string(lookup_config(config_tree, "Name"), &name);
301
302         if(name)
303                 asprintf(&filename, "%s/hosts/%s", confbase, name);
304         else
305                 asprintf(&filename, "%s/rsa_key.pub", confbase);
306
307         f = ask_and_safe_open(filename, _("public RSA key"), false, "a");
308
309         if(!f)
310                 return false;
311
312         if(ftell(f))
313                 fprintf(stderr, _("Appending key to existing contents.\nMake sure only one key is stored in the file.\n"));
314
315         PEM_write_RSAPublicKey(f, rsa_key);
316         fclose(f);
317         free(filename);
318
319         return true;
320 }
321
322 /*
323   Set all files and paths according to netname
324 */
325 static void make_names(void)
326 {
327         if(netname)
328                 asprintf(&identname, "tinc.%s", netname);
329         else
330                 identname = xstrdup("tinc");
331
332         if(!pidfilename)
333                 asprintf(&pidfilename, LOCALSTATEDIR "/run/%s.pid", identname);
334
335         if(!logfilename)
336                 asprintf(&logfilename, LOCALSTATEDIR "/log/%s.log", identname);
337
338         if(netname) {
339                 if(!confbase)
340                         asprintf(&confbase, "%s/tinc/%s", CONFDIR, netname);
341                 else
342                         logger(LOG_INFO, _("Both netname and configuration directory given, using the latter..."));
343         } else {
344                 if(!confbase)
345                         asprintf(&confbase, "%s/tinc", CONFDIR);
346         }
347 }
348
349 int main(int argc, char **argv, char **envp)
350 {
351         program_name = argv[0];
352
353         setlocale(LC_ALL, "");
354         bindtextdomain(PACKAGE, LOCALEDIR);
355         textdomain(PACKAGE);
356
357         environment = envp;
358         parse_options(argc, argv, envp);
359         make_names();
360
361         if(show_version) {
362                 printf(_("%s version %s (built %s %s, protocol %d)\n"), PACKAGE,
363                            VERSION, __DATE__, __TIME__, PROT_CURRENT);
364                 printf(_("Copyright (C) 1998-2003 Ivo Timmermans, Guus Sliepen and others.\n"
365                                 "See the AUTHORS file for a complete list.\n\n"
366                                 "tinc comes with ABSOLUTELY NO WARRANTY.  This is free software,\n"
367                                 "and you are welcome to redistribute it under certain conditions;\n"
368                                 "see the file COPYING for details.\n"));
369
370                 return 0;
371         }
372
373         if(show_help)
374                 usage(false);
375
376         if(kill_tincd)
377                 exit(!kill_other(kill_tincd));
378
379         openlogger("tinc", LOGMODE_STDERR);
380
381         /* Lock all pages into memory if requested */
382
383         if(do_mlock)
384 #ifdef HAVE_MLOCKALL
385                 if(mlockall(MCL_CURRENT | MCL_FUTURE)) {
386                         logger(LOG_ERR, _("System call `%s' failed: %s"), "mlockall",
387                                    strerror(errno));
388 #else
389         {
390                 logger(LOG_ERR, _("mlockall() not supported on this platform!"));
391 #endif
392                 return -1;
393         }
394
395         g_argv = argv;
396
397         init_configuration(&config_tree);
398
399         /* Slllluuuuuuurrrrp! */
400
401         RAND_load_file("/dev/urandom", 1024);
402
403         OpenSSL_add_all_algorithms();
404
405         if(generate_keys) {
406                 read_server_config();
407                 exit(!keygen(generate_keys));
408         }
409
410         if(!read_server_config())
411                 exit(1);
412
413         if(lzo_init() != LZO_E_OK) {
414                 logger(LOG_ERR, _("Error initializing LZO compressor!"));
415                 exit(1);
416         }
417
418         if(!detach())
419                 exit(1);
420                 
421         for(;;) {
422                 if(setup_network_connections()) {
423                         main_loop();
424                         cleanup_and_exit(1);
425                 }
426
427                 logger(LOG_ERR, _("Unrecoverable error"));
428                 cp_trace();
429
430                 if(do_detach) {
431                         logger(LOG_NOTICE, _("Restarting in %d seconds!"), maxtimeout);
432                         sleep(maxtimeout);
433                 } else {
434                         logger(LOG_ERR, _("Not restarting."));
435                         exit(1);
436                 }
437         }
438 }