| /* $NetBSD: admin.c,v 1.38 2010/12/08 07:38:35 tteras Exp $ */ |
| |
| /* Id: admin.c,v 1.25 2006/04/06 14:31:04 manubsd Exp */ |
| |
| /* |
| * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. Neither the name of the project nor the names of its contributors |
| * may be used to endorse or promote products derived from this software |
| * without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND |
| * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE |
| * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| * SUCH DAMAGE. |
| */ |
| |
| #include "config.h" |
| |
| #include <sys/types.h> |
| #include <sys/param.h> |
| #include <sys/socket.h> |
| #include <sys/signal.h> |
| #include <sys/stat.h> |
| #include <sys/un.h> |
| |
| #include <net/pfkeyv2.h> |
| |
| #include <netinet/in.h> |
| #include PATH_IPSEC_H |
| |
| |
| #include <stdlib.h> |
| #include <stdio.h> |
| #include <string.h> |
| #include <errno.h> |
| #include <netdb.h> |
| #ifdef HAVE_UNISTD_H |
| #include <unistd.h> |
| #endif |
| #ifdef ENABLE_HYBRID |
| #include <resolv.h> |
| #endif |
| |
| #include "var.h" |
| #include "misc.h" |
| #include "vmbuf.h" |
| #include "plog.h" |
| #include "sockmisc.h" |
| #include "debug.h" |
| |
| #include "schedule.h" |
| #include "localconf.h" |
| #include "remoteconf.h" |
| #include "grabmyaddr.h" |
| #include "isakmp_var.h" |
| #include "isakmp.h" |
| #include "oakley.h" |
| #include "handler.h" |
| #include "evt.h" |
| #include "pfkey.h" |
| #include "ipsec_doi.h" |
| #include "policy.h" |
| #include "admin.h" |
| #include "admin_var.h" |
| #include "isakmp_inf.h" |
| #ifdef ENABLE_HYBRID |
| #include "isakmp_cfg.h" |
| #endif |
| #include "session.h" |
| #include "gcmalloc.h" |
| |
| #ifdef ENABLE_ADMINPORT |
| char *adminsock_path = ADMINSOCK_PATH; |
| uid_t adminsock_owner = 0; |
| gid_t adminsock_group = 0; |
| mode_t adminsock_mode = 0600; |
| |
| static struct sockaddr_un sunaddr; |
| static int admin_process __P((int, char *)); |
| static int admin_reply __P((int, struct admin_com *, int, vchar_t *)); |
| |
| static int |
| admin_handler(ctx, fd) |
| void *ctx; |
| int fd; |
| { |
| int so2; |
| struct sockaddr_storage from; |
| socklen_t fromlen = sizeof(from); |
| struct admin_com com; |
| char *combuf = NULL; |
| int len, error = -1; |
| |
| so2 = accept(lcconf->sock_admin, (struct sockaddr *)&from, &fromlen); |
| if (so2 < 0) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "failed to accept admin command: %s\n", |
| strerror(errno)); |
| return -1; |
| } |
| close_on_exec(so2); |
| |
| /* get buffer length */ |
| while ((len = recv(so2, (char *)&com, sizeof(com), MSG_PEEK)) < 0) { |
| if (errno == EINTR) |
| continue; |
| plog(LLV_ERROR, LOCATION, NULL, |
| "failed to recv admin command: %s\n", |
| strerror(errno)); |
| goto end; |
| } |
| |
| /* sanity check */ |
| if (len < sizeof(com)) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "invalid header length of admin command\n"); |
| goto end; |
| } |
| |
| /* get buffer to receive */ |
| if ((combuf = racoon_malloc(com.ac_len)) == 0) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "failed to alloc buffer for admin command\n"); |
| goto end; |
| } |
| |
| /* get real data */ |
| while ((len = recv(so2, combuf, com.ac_len, 0)) < 0) { |
| if (errno == EINTR) |
| continue; |
| plog(LLV_ERROR, LOCATION, NULL, |
| "failed to recv admin command: %s\n", |
| strerror(errno)); |
| goto end; |
| } |
| |
| error = admin_process(so2, combuf); |
| |
| end: |
| if (error == -2) { |
| plog(LLV_DEBUG, LOCATION, NULL, |
| "[%d] admin connection established\n", so2); |
| } else { |
| (void)close(so2); |
| } |
| |
| if (combuf) |
| racoon_free(combuf); |
| |
| return error; |
| } |
| |
| static int admin_ph1_delete_sa(struct ph1handle *iph1, void *arg) |
| { |
| if (iph1->status >= PHASE1ST_ESTABLISHED) |
| isakmp_info_send_d1(iph1); |
| purge_remote(iph1); |
| return 0; |
| } |
| |
| /* |
| * main child's process. |
| */ |
| static int |
| admin_process(so2, combuf) |
| int so2; |
| char *combuf; |
| { |
| struct admin_com *com = (struct admin_com *)combuf; |
| vchar_t *buf = NULL; |
| vchar_t *id = NULL; |
| vchar_t *key = NULL; |
| int idtype = 0; |
| int error = 0, l_ac_errno = 0; |
| struct evt_listener_list *event_list = NULL; |
| |
| if (com->ac_cmd & ADMIN_FLAG_VERSION) |
| com->ac_cmd &= ~ADMIN_FLAG_VERSION; |
| else |
| com->ac_version = 0; |
| |
| switch (com->ac_cmd) { |
| case ADMIN_RELOAD_CONF: |
| signal_handler(SIGHUP); |
| break; |
| |
| case ADMIN_SHOW_SCHED: { |
| caddr_t p = NULL; |
| int len; |
| |
| if (sched_dump(&p, &len) != -1) { |
| buf = vmalloc(len); |
| if (buf != NULL) |
| memcpy(buf->v, p, len); |
| else |
| l_ac_errno = ENOMEM; |
| racoon_free(p); |
| } else |
| l_ac_errno = ENOMEM; |
| break; |
| } |
| |
| case ADMIN_SHOW_EVT: |
| if (com->ac_version == 0) { |
| buf = evt_dump(); |
| l_ac_errno = 0; |
| } |
| break; |
| |
| case ADMIN_SHOW_SA: |
| switch (com->ac_proto) { |
| case ADMIN_PROTO_ISAKMP: |
| buf = dumpph1(); |
| if (buf == NULL) |
| l_ac_errno = ENOMEM; |
| break; |
| case ADMIN_PROTO_IPSEC: |
| case ADMIN_PROTO_AH: |
| case ADMIN_PROTO_ESP: { |
| u_int p; |
| p = admin2pfkey_proto(com->ac_proto); |
| if (p != -1) { |
| buf = pfkey_dump_sadb(p); |
| if (buf == NULL) |
| l_ac_errno = ENOMEM; |
| } else |
| l_ac_errno = EINVAL; |
| break; |
| } |
| case ADMIN_PROTO_INTERNAL: |
| default: |
| l_ac_errno = ENOTSUP; |
| break; |
| } |
| break; |
| |
| case ADMIN_GET_SA_CERT: { |
| struct admin_com_indexes *ndx; |
| struct sockaddr *src, *dst; |
| struct ph1handle *iph1; |
| |
| ndx = (struct admin_com_indexes *) ((caddr_t)com + sizeof(*com)); |
| src = (struct sockaddr *) &ndx->src; |
| dst = (struct sockaddr *) &ndx->dst; |
| |
| if (com->ac_proto != ADMIN_PROTO_ISAKMP) { |
| l_ac_errno = ENOTSUP; |
| break; |
| } |
| |
| iph1 = getph1byaddr(src, dst, 0); |
| if (iph1 == NULL) { |
| l_ac_errno = ENOENT; |
| break; |
| } |
| |
| if (iph1->cert_p != NULL) { |
| vchar_t tmp; |
| tmp.v = iph1->cert_p->v + 1; |
| tmp.l = iph1->cert_p->l - 1; |
| buf = vdup(&tmp); |
| } |
| break; |
| } |
| |
| case ADMIN_FLUSH_SA: |
| switch (com->ac_proto) { |
| case ADMIN_PROTO_ISAKMP: |
| flushph1(); |
| break; |
| case ADMIN_PROTO_IPSEC: |
| case ADMIN_PROTO_AH: |
| case ADMIN_PROTO_ESP: |
| pfkey_flush_sadb(com->ac_proto); |
| break; |
| case ADMIN_PROTO_INTERNAL: |
| /*XXX flushph2();*/ |
| default: |
| l_ac_errno = ENOTSUP; |
| break; |
| } |
| break; |
| |
| case ADMIN_DELETE_SA: { |
| char *loc, *rem; |
| struct ph1selector sel; |
| |
| memset(&sel, 0, sizeof(sel)); |
| sel.local = (struct sockaddr *) |
| &((struct admin_com_indexes *) |
| ((caddr_t)com + sizeof(*com)))->src; |
| sel.remote = (struct sockaddr *) |
| &((struct admin_com_indexes *) |
| ((caddr_t)com + sizeof(*com)))->dst; |
| |
| loc = racoon_strdup(saddr2str(sel.local)); |
| rem = racoon_strdup(saddr2str(sel.remote)); |
| STRDUP_FATAL(loc); |
| STRDUP_FATAL(rem); |
| |
| plog(LLV_INFO, LOCATION, NULL, |
| "admin delete-sa %s %s\n", loc, rem); |
| enumph1(&sel, admin_ph1_delete_sa, NULL); |
| remcontacted(sel.remote); |
| |
| racoon_free(loc); |
| racoon_free(rem); |
| break; |
| } |
| |
| #ifdef ENABLE_HYBRID |
| case ADMIN_LOGOUT_USER: { |
| struct ph1handle *iph1; |
| char user[LOGINLEN+1]; |
| int found = 0, len = com->ac_len - sizeof(*com); |
| |
| if (len > LOGINLEN) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "malformed message (login too long)\n"); |
| break; |
| } |
| |
| memcpy(user, (char *)(com + 1), len); |
| user[len] = 0; |
| |
| found = purgeph1bylogin(user); |
| plog(LLV_INFO, LOCATION, NULL, |
| "deleted %d SA for user \"%s\"\n", found, user); |
| |
| break; |
| } |
| #endif |
| |
| case ADMIN_DELETE_ALL_SA_DST: { |
| struct ph1handle *iph1; |
| struct sockaddr *dst; |
| char *loc, *rem; |
| |
| dst = (struct sockaddr *) |
| &((struct admin_com_indexes *) |
| ((caddr_t)com + sizeof(*com)))->dst; |
| |
| rem = racoon_strdup(saddrwop2str(dst)); |
| STRDUP_FATAL(rem); |
| |
| plog(LLV_INFO, LOCATION, NULL, |
| "Flushing all SAs for peer %s\n", rem); |
| |
| while ((iph1 = getph1bydstaddr(dst)) != NULL) { |
| loc = racoon_strdup(saddrwop2str(iph1->local)); |
| STRDUP_FATAL(loc); |
| |
| if (iph1->status >= PHASE1ST_ESTABLISHED) |
| isakmp_info_send_d1(iph1); |
| purge_remote(iph1); |
| |
| racoon_free(loc); |
| } |
| |
| racoon_free(rem); |
| break; |
| } |
| |
| case ADMIN_ESTABLISH_SA_PSK: { |
| struct admin_com_psk *acp; |
| char *data; |
| |
| acp = (struct admin_com_psk *) |
| ((char *)com + sizeof(*com) + |
| sizeof(struct admin_com_indexes)); |
| |
| idtype = acp->id_type; |
| |
| if ((id = vmalloc(acp->id_len)) == NULL) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "cannot allocate memory: %s\n", |
| strerror(errno)); |
| break; |
| } |
| data = (char *)(acp + 1); |
| memcpy(id->v, data, id->l); |
| |
| if ((key = vmalloc(acp->key_len)) == NULL) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "cannot allocate memory: %s\n", |
| strerror(errno)); |
| vfree(id); |
| id = NULL; |
| break; |
| } |
| data = (char *)(data + acp->id_len); |
| memcpy(key->v, data, key->l); |
| } |
| /* FALLTHROUGH */ |
| case ADMIN_ESTABLISH_SA: { |
| struct admin_com_indexes *ndx; |
| struct sockaddr *dst; |
| struct sockaddr *src; |
| char *name = NULL; |
| |
| ndx = (struct admin_com_indexes *) ((caddr_t)com + sizeof(*com)); |
| src = (struct sockaddr *) &ndx->src; |
| dst = (struct sockaddr *) &ndx->dst; |
| |
| if (com->ac_cmd == ADMIN_ESTABLISH_SA && |
| com->ac_len > sizeof(*com) + sizeof(*ndx)) |
| name = (char *) ((caddr_t) ndx + sizeof(*ndx)); |
| |
| switch (com->ac_proto) { |
| case ADMIN_PROTO_ISAKMP: { |
| struct ph1handle *ph1; |
| struct remoteconf *rmconf; |
| u_int16_t port; |
| |
| l_ac_errno = -1; |
| |
| /* connected already? */ |
| ph1 = getph1byaddr(src, dst, 0); |
| if (ph1 != NULL) { |
| event_list = &ph1->evt_listeners; |
| if (ph1->status == PHASE1ST_ESTABLISHED) |
| l_ac_errno = EEXIST; |
| else |
| l_ac_errno = 0; |
| break; |
| } |
| |
| /* search appropreate configuration */ |
| if (name == NULL) |
| rmconf = getrmconf(dst, 0); |
| else |
| rmconf = getrmconf_by_name(name); |
| if (rmconf == NULL) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "no configuration found " |
| "for %s\n", saddrwop2str(dst)); |
| break; |
| } |
| |
| #ifdef ENABLE_HYBRID |
| /* XXX This overwrites rmconf information globally. */ |
| /* Set the id and key */ |
| if (id && key) { |
| if (xauth_rmconf_used(&rmconf->xauth) == -1) |
| break; |
| |
| if (rmconf->xauth->login != NULL) { |
| vfree(rmconf->xauth->login); |
| rmconf->xauth->login = NULL; |
| } |
| if (rmconf->xauth->pass != NULL) { |
| vfree(rmconf->xauth->pass); |
| rmconf->xauth->pass = NULL; |
| } |
| |
| rmconf->xauth->login = id; |
| rmconf->xauth->pass = key; |
| } |
| #endif |
| |
| plog(LLV_INFO, LOCATION, NULL, |
| "accept a request to establish IKE-SA: " |
| "%s\n", saddrwop2str(dst)); |
| |
| /* begin ident mode */ |
| ph1 = isakmp_ph1begin_i(rmconf, dst, src); |
| if (ph1 == NULL) |
| break; |
| |
| event_list = &ph1->evt_listeners; |
| l_ac_errno = 0; |
| break; |
| } |
| case ADMIN_PROTO_AH: |
| case ADMIN_PROTO_ESP: { |
| struct ph2handle *iph2; |
| struct secpolicy *sp_out = NULL, *sp_in = NULL; |
| struct policyindex spidx; |
| |
| l_ac_errno = -1; |
| |
| /* got outbound policy */ |
| memset(&spidx, 0, sizeof(spidx)); |
| spidx.dir = IPSEC_DIR_OUTBOUND; |
| memcpy(&spidx.src, src, sizeof(spidx.src)); |
| memcpy(&spidx.dst, dst, sizeof(spidx.dst)); |
| spidx.prefs = ndx->prefs; |
| spidx.prefd = ndx->prefd; |
| spidx.ul_proto = ndx->ul_proto; |
| |
| sp_out = getsp_r(&spidx); |
| if (sp_out) { |
| plog(LLV_DEBUG, LOCATION, NULL, |
| "suitable outbound SP found: %s.\n", |
| spidx2str(&sp_out->spidx)); |
| } else { |
| l_ac_errno = ENOENT; |
| plog(LLV_NOTIFY, LOCATION, NULL, |
| "no outbound policy found: %s\n", |
| spidx2str(&spidx)); |
| break; |
| } |
| |
| iph2 = getph2byid(src, dst, sp_out->id); |
| if (iph2 != NULL) { |
| event_list = &iph2->evt_listeners; |
| if (iph2->status == PHASE2ST_ESTABLISHED) |
| l_ac_errno = EEXIST; |
| else |
| l_ac_errno = 0; |
| break; |
| } |
| |
| /* get inbound policy */ |
| memset(&spidx, 0, sizeof(spidx)); |
| spidx.dir = IPSEC_DIR_INBOUND; |
| memcpy(&spidx.src, dst, sizeof(spidx.src)); |
| memcpy(&spidx.dst, src, sizeof(spidx.dst)); |
| spidx.prefs = ndx->prefd; |
| spidx.prefd = ndx->prefs; |
| spidx.ul_proto = ndx->ul_proto; |
| |
| sp_in = getsp_r(&spidx); |
| if (sp_in) { |
| plog(LLV_DEBUG, LOCATION, NULL, |
| "suitable inbound SP found: %s.\n", |
| spidx2str(&sp_in->spidx)); |
| } else { |
| l_ac_errno = ENOENT; |
| plog(LLV_NOTIFY, LOCATION, NULL, |
| "no inbound policy found: %s\n", |
| spidx2str(&spidx)); |
| break; |
| } |
| |
| /* allocate a phase 2 */ |
| iph2 = newph2(); |
| if (iph2 == NULL) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "failed to allocate phase2 entry.\n"); |
| break; |
| } |
| iph2->side = INITIATOR; |
| iph2->satype = admin2pfkey_proto(com->ac_proto); |
| iph2->spid = sp_out->id; |
| iph2->seq = pk_getseq(); |
| iph2->status = PHASE2ST_STATUS2; |
| |
| /* set end addresses of SA */ |
| iph2->sa_dst = dupsaddr(dst); |
| iph2->sa_src = dupsaddr(src); |
| iph2->dst = dupsaddr(dst); |
| iph2->src = dupsaddr(src); |
| if (iph2->sa_src == NULL || iph2->sa_dst == NULL || |
| iph2->dst == NULL || iph2->src == NULL) { |
| delph2(iph2); |
| break; |
| } |
| set_port(iph2->dst, 0); |
| set_port(iph2->src, 0); |
| |
| if (isakmp_get_sainfo(iph2, sp_out, sp_in) < 0) { |
| delph2(iph2); |
| break; |
| } |
| |
| insph2(iph2); |
| if (isakmp_post_acquire(iph2, NULL, FALSE) < 0) { |
| remph2(iph2); |
| delph2(iph2); |
| break; |
| } |
| |
| event_list = &iph2->evt_listeners; |
| l_ac_errno = 0; |
| break; |
| } |
| default: |
| /* ignore */ |
| l_ac_errno = ENOTSUP; |
| } |
| break; |
| } |
| |
| default: |
| plog(LLV_ERROR, LOCATION, NULL, |
| "invalid command: %d\n", com->ac_cmd); |
| l_ac_errno = ENOTSUP; |
| } |
| |
| if ((error = admin_reply(so2, com, l_ac_errno, buf)) != 0) |
| goto out; |
| |
| /* start pushing events if so requested */ |
| if ((l_ac_errno == 0) && |
| (com->ac_version >= 1) && |
| (com->ac_cmd == ADMIN_SHOW_EVT || event_list != NULL)) |
| error = evt_subscribe(event_list, so2); |
| out: |
| if (buf != NULL) |
| vfree(buf); |
| |
| return error; |
| } |
| |
| static int |
| admin_reply(so, req, l_ac_errno, buf) |
| int so, l_ac_errno; |
| struct admin_com *req; |
| vchar_t *buf; |
| { |
| int tlen; |
| struct admin_com *combuf; |
| char *retbuf = NULL; |
| |
| if (buf != NULL) |
| tlen = sizeof(*combuf) + buf->l; |
| else |
| tlen = sizeof(*combuf); |
| |
| retbuf = racoon_calloc(1, tlen); |
| if (retbuf == NULL) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "failed to allocate admin buffer\n"); |
| return -1; |
| } |
| |
| combuf = (struct admin_com *) retbuf; |
| combuf->ac_len = (u_int16_t) tlen; |
| combuf->ac_cmd = req->ac_cmd & ~ADMIN_FLAG_VERSION; |
| if (tlen != (u_int32_t) combuf->ac_len && |
| l_ac_errno == 0) { |
| combuf->ac_len_high = tlen >> 16; |
| combuf->ac_cmd |= ADMIN_FLAG_LONG_REPLY; |
| } else { |
| combuf->ac_errno = l_ac_errno; |
| } |
| combuf->ac_proto = req->ac_proto; |
| |
| if (buf != NULL) |
| memcpy(retbuf + sizeof(*combuf), buf->v, buf->l); |
| |
| tlen = send(so, retbuf, tlen, 0); |
| racoon_free(retbuf); |
| if (tlen < 0) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "failed to send admin command: %s\n", |
| strerror(errno)); |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| /* ADMIN_PROTO -> SADB_SATYPE */ |
| int |
| admin2pfkey_proto(proto) |
| u_int proto; |
| { |
| switch (proto) { |
| case ADMIN_PROTO_IPSEC: |
| return SADB_SATYPE_UNSPEC; |
| case ADMIN_PROTO_AH: |
| return SADB_SATYPE_AH; |
| case ADMIN_PROTO_ESP: |
| return SADB_SATYPE_ESP; |
| default: |
| plog(LLV_ERROR, LOCATION, NULL, |
| "unsupported proto for admin: %d\n", proto); |
| return -1; |
| } |
| /*NOTREACHED*/ |
| } |
| |
| int |
| admin_init() |
| { |
| if (adminsock_path == NULL) { |
| lcconf->sock_admin = -1; |
| return 0; |
| } |
| |
| memset(&sunaddr, 0, sizeof(sunaddr)); |
| sunaddr.sun_family = AF_UNIX; |
| snprintf(sunaddr.sun_path, sizeof(sunaddr.sun_path), |
| "%s", adminsock_path); |
| |
| lcconf->sock_admin = socket(AF_UNIX, SOCK_STREAM, 0); |
| if (lcconf->sock_admin == -1) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "socket: %s\n", strerror(errno)); |
| return -1; |
| } |
| close_on_exec(lcconf->sock_admin); |
| |
| unlink(sunaddr.sun_path); |
| if (bind(lcconf->sock_admin, (struct sockaddr *)&sunaddr, |
| sizeof(sunaddr)) != 0) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "bind(sockname:%s): %s\n", |
| sunaddr.sun_path, strerror(errno)); |
| (void)close(lcconf->sock_admin); |
| return -1; |
| } |
| |
| if (chown(sunaddr.sun_path, adminsock_owner, adminsock_group) != 0) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "chown(%s, %d, %d): %s\n", |
| sunaddr.sun_path, adminsock_owner, |
| adminsock_group, strerror(errno)); |
| (void)close(lcconf->sock_admin); |
| return -1; |
| } |
| |
| if (chmod(sunaddr.sun_path, adminsock_mode) != 0) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "chmod(%s, 0%03o): %s\n", |
| sunaddr.sun_path, adminsock_mode, strerror(errno)); |
| (void)close(lcconf->sock_admin); |
| return -1; |
| } |
| |
| if (listen(lcconf->sock_admin, 5) != 0) { |
| plog(LLV_ERROR, LOCATION, NULL, |
| "listen(sockname:%s): %s\n", |
| sunaddr.sun_path, strerror(errno)); |
| (void)close(lcconf->sock_admin); |
| return -1; |
| } |
| |
| monitor_fd(lcconf->sock_admin, admin_handler, NULL, 0); |
| plog(LLV_DEBUG, LOCATION, NULL, |
| "open %s as racoon management.\n", sunaddr.sun_path); |
| |
| return 0; |
| } |
| |
| int |
| admin_close() |
| { |
| unmonitor_fd(lcconf->sock_admin); |
| close(lcconf->sock_admin); |
| return 0; |
| } |
| |
| #endif |