mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-27 22:03:31 +01:00
Merge remote-tracking branch 'origin/maint-0.2.2'
This commit is contained in:
commit
4ac8ff9c9f
8
changes/bug2792_checkdir
Normal file
8
changes/bug2792_checkdir
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
o Minor features:
|
||||||
|
- Tor now refuses to create a ControlSocket in a directory that is
|
||||||
|
world-readable (or group-readable if ControlSocketsGroupWritable
|
||||||
|
is 0). This is necessary because some operating systems do not
|
||||||
|
check the permissions on an AF_UNIX socket when programs try to
|
||||||
|
connect to it. Checking permissions on the directory holding
|
||||||
|
the socket, however, seems to work everywhere.
|
||||||
|
|
5
changes/bug2972
Normal file
5
changes/bug2972
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
o Minor features:
|
||||||
|
- Allow ControlSockets to be group-writable when the
|
||||||
|
ControlSocksGroupWritable configuration option is turned on. Patch
|
||||||
|
by Jérémy Bobbio; implements ticket 2972.
|
||||||
|
|
@ -167,6 +167,11 @@ Other options can be specified either on the command-line (--option
|
|||||||
Like ControlPort, but listens on a Unix domain socket, rather than a TCP
|
Like ControlPort, but listens on a Unix domain socket, rather than a TCP
|
||||||
socket. (Unix and Unix-like systems only.)
|
socket. (Unix and Unix-like systems only.)
|
||||||
|
|
||||||
|
**ControlSocketsGroupWritable** **0**|**1**::
|
||||||
|
If this option is set to 0, don't allow the filesystem group to read and
|
||||||
|
write unix sockets (e.g. ControlSocket). If the option is set to 1, make
|
||||||
|
the control socket readable and writable by the default GID. (Default: 0)
|
||||||
|
|
||||||
**HashedControlPassword** __hashed_password__::
|
**HashedControlPassword** __hashed_password__::
|
||||||
Don't allow any connections on the control port except when the other
|
Don't allow any connections on the control port except when the other
|
||||||
process knows the password whose one-way hash is __hashed_password__. You
|
process knows the password whose one-way hash is __hashed_password__. You
|
||||||
|
@ -1522,6 +1522,45 @@ get_user_homedir(const char *username)
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
/** Modify <b>fname</b> to contain the name of the directory */
|
||||||
|
int
|
||||||
|
get_parent_directory(char *fname)
|
||||||
|
{
|
||||||
|
char *cp;
|
||||||
|
int at_end = 1;
|
||||||
|
tor_assert(fname);
|
||||||
|
#ifdef MS_WINDOWS
|
||||||
|
/* If we start with, say, c:, then don't consider that the start of the path
|
||||||
|
*/
|
||||||
|
if (fname[0] && fname[1] == ':') {
|
||||||
|
fname += 2;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
/* Now we want to remove all path-separators at the end of the string,
|
||||||
|
* and to remove the end of the string starting with the path separator
|
||||||
|
* before the last non-path-separator. In perl, this would be
|
||||||
|
* s#[/]*$##; s#/[^/]*$##;
|
||||||
|
* on a unixy platform.
|
||||||
|
*/
|
||||||
|
cp = fname + strlen(fname);
|
||||||
|
at_end = 1;
|
||||||
|
while (--cp > fname) {
|
||||||
|
int is_sep = (*cp == '/'
|
||||||
|
#ifdef MS_WINDOWS
|
||||||
|
|| *cp == '\\'
|
||||||
|
#endif
|
||||||
|
);
|
||||||
|
if (is_sep) {
|
||||||
|
*cp = '\0';
|
||||||
|
if (! at_end)
|
||||||
|
return 0;
|
||||||
|
} else {
|
||||||
|
at_end = 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
/** Set *addr to the IP address (in dotted-quad notation) stored in c.
|
/** Set *addr to the IP address (in dotted-quad notation) stored in c.
|
||||||
* Return 1 on success, 0 if c is badly formatted. (Like inet_aton(c,addr),
|
* Return 1 on success, 0 if c is badly formatted. (Like inet_aton(c,addr),
|
||||||
* but works on Windows and Solaris.)
|
* but works on Windows and Solaris.)
|
||||||
|
@ -557,6 +557,8 @@ int switch_id(const char *user);
|
|||||||
char *get_user_homedir(const char *username);
|
char *get_user_homedir(const char *username);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
int get_parent_directory(char *fname);
|
||||||
|
|
||||||
int spawn_func(void (*func)(void *), void *data);
|
int spawn_func(void (*func)(void *), void *data);
|
||||||
void spawn_exit(void) ATTR_NORETURN;
|
void spawn_exit(void) ATTR_NORETURN;
|
||||||
|
|
||||||
|
@ -31,6 +31,7 @@
|
|||||||
#else
|
#else
|
||||||
#include <dirent.h>
|
#include <dirent.h>
|
||||||
#include <pwd.h>
|
#include <pwd.h>
|
||||||
|
#include <grp.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/* math.h needs this on Linux */
|
/* math.h needs this on Linux */
|
||||||
@ -1665,17 +1666,25 @@ file_status(const char *fname)
|
|||||||
return FN_ERROR;
|
return FN_ERROR;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Check whether dirname exists and is private. If yes return 0. If
|
/** Check whether <b>dirname</b> exists and is private. If yes return 0. If
|
||||||
* it does not exist, and check==CPD_CREATE is set, try to create it
|
* it does not exist, and <b>check</b>&CPD_CREATE is set, try to create it
|
||||||
* and return 0 on success. If it does not exist, and
|
* and return 0 on success. If it does not exist, and
|
||||||
* check==CPD_CHECK, and we think we can create it, return 0. Else
|
* <b>check</b>&CPD_CHECK, and we think we can create it, return 0. Else
|
||||||
* return -1. */
|
* return -1. If CPD_GROUP_OK is set, then it's okay if the directory
|
||||||
|
* is group-readable, but in all cases we create the directory mode 0700.
|
||||||
|
* If CPD_CHECK_MODE_ONLY is set, then we don't alter the directory permissions
|
||||||
|
* if they are too permissive: we just return -1.
|
||||||
|
*/
|
||||||
int
|
int
|
||||||
check_private_dir(const char *dirname, cpd_check_t check)
|
check_private_dir(const char *dirname, cpd_check_t check)
|
||||||
{
|
{
|
||||||
int r;
|
int r;
|
||||||
struct stat st;
|
struct stat st;
|
||||||
char *f;
|
char *f;
|
||||||
|
#ifndef MS_WINDOWS
|
||||||
|
int mask;
|
||||||
|
#endif
|
||||||
|
|
||||||
tor_assert(dirname);
|
tor_assert(dirname);
|
||||||
f = tor_strdup(dirname);
|
f = tor_strdup(dirname);
|
||||||
clean_name_for_stat(f);
|
clean_name_for_stat(f);
|
||||||
@ -1687,10 +1696,7 @@ check_private_dir(const char *dirname, cpd_check_t check)
|
|||||||
strerror(errno));
|
strerror(errno));
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
if (check == CPD_NONE) {
|
if (check & CPD_CREATE) {
|
||||||
log_warn(LD_FS, "Directory %s does not exist.", dirname);
|
|
||||||
return -1;
|
|
||||||
} else if (check == CPD_CREATE) {
|
|
||||||
log_info(LD_GENERAL, "Creating directory %s", dirname);
|
log_info(LD_GENERAL, "Creating directory %s", dirname);
|
||||||
#if defined (MS_WINDOWS) && !defined (WINCE)
|
#if defined (MS_WINDOWS) && !defined (WINCE)
|
||||||
r = mkdir(dirname);
|
r = mkdir(dirname);
|
||||||
@ -1702,6 +1708,9 @@ check_private_dir(const char *dirname, cpd_check_t check)
|
|||||||
strerror(errno));
|
strerror(errno));
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
} else if (!(check & CPD_CHECK)) {
|
||||||
|
log_warn(LD_FS, "Directory %s does not exist.", dirname);
|
||||||
|
return -1;
|
||||||
}
|
}
|
||||||
/* XXXX In the case where check==CPD_CHECK, we should look at the
|
/* XXXX In the case where check==CPD_CHECK, we should look at the
|
||||||
* parent directory a little harder. */
|
* parent directory a little harder. */
|
||||||
@ -1729,9 +1738,38 @@ check_private_dir(const char *dirname, cpd_check_t check)
|
|||||||
tor_free(process_ownername);
|
tor_free(process_ownername);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
if (st.st_mode & 0077) {
|
if ((check & CPD_GROUP_OK) && st.st_gid != getgid()) {
|
||||||
|
struct group *gr;
|
||||||
|
char *process_groupname = NULL;
|
||||||
|
gr = getgrgid(getgid());
|
||||||
|
process_groupname = gr ? tor_strdup(gr->gr_name) : tor_strdup("<unknown>");
|
||||||
|
gr = getgrgid(st.st_gid);
|
||||||
|
|
||||||
|
log_warn(LD_FS, "%s is not owned by this group (%s, %d) but by group "
|
||||||
|
"%s (%d). Are you running Tor as the wrong user?",
|
||||||
|
dirname, process_groupname, (int)getgid(),
|
||||||
|
gr ? gr->gr_name : "<unknown>", (int)st.st_gid);
|
||||||
|
|
||||||
|
tor_free(process_groupname);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
if (check & CPD_GROUP_OK) {
|
||||||
|
mask = 0027;
|
||||||
|
} else {
|
||||||
|
mask = 0077;
|
||||||
|
}
|
||||||
|
if (st.st_mode & mask) {
|
||||||
|
unsigned new_mode;
|
||||||
|
if (check & CPD_CHECK_MODE_ONLY) {
|
||||||
|
log_warn(LD_FS, "Permissions on directory %s are too permissive.",
|
||||||
|
dirname);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
log_warn(LD_FS, "Fixing permissions on directory %s", dirname);
|
log_warn(LD_FS, "Fixing permissions on directory %s", dirname);
|
||||||
if (chmod(dirname, 0700)) {
|
new_mode = st.st_mode;
|
||||||
|
new_mode |= 0700; /* Owner should have rwx */
|
||||||
|
new_mode &= ~mask; /* Clear the other bits that we didn't want set...*/
|
||||||
|
if (chmod(dirname, new_mode)) {
|
||||||
log_warn(LD_FS, "Could not chmod directory %s: %s", dirname,
|
log_warn(LD_FS, "Could not chmod directory %s: %s", dirname,
|
||||||
strerror(errno));
|
strerror(errno));
|
||||||
return -1;
|
return -1;
|
||||||
|
@ -286,7 +286,12 @@ file_status_t file_status(const char *filename);
|
|||||||
|
|
||||||
/** Possible behaviors for check_private_dir() on encountering a nonexistent
|
/** Possible behaviors for check_private_dir() on encountering a nonexistent
|
||||||
* directory; see that function's documentation for details. */
|
* directory; see that function's documentation for details. */
|
||||||
typedef enum { CPD_NONE, CPD_CREATE, CPD_CHECK } cpd_check_t;
|
typedef unsigned int cpd_check_t;
|
||||||
|
#define CPD_NONE 0
|
||||||
|
#define CPD_CREATE 1
|
||||||
|
#define CPD_CHECK 2
|
||||||
|
#define CPD_GROUP_OK 4
|
||||||
|
#define CPD_CHECK_MODE_ONLY 8
|
||||||
int check_private_dir(const char *dirname, cpd_check_t check);
|
int check_private_dir(const char *dirname, cpd_check_t check);
|
||||||
#define OPEN_FLAGS_REPLACE (O_WRONLY|O_CREAT|O_TRUNC)
|
#define OPEN_FLAGS_REPLACE (O_WRONLY|O_CREAT|O_TRUNC)
|
||||||
#define OPEN_FLAGS_APPEND (O_WRONLY|O_CREAT|O_APPEND)
|
#define OPEN_FLAGS_APPEND (O_WRONLY|O_CREAT|O_APPEND)
|
||||||
|
@ -214,6 +214,7 @@ static config_var_t _option_vars[] = {
|
|||||||
V(ControlPortFileGroupReadable,BOOL, "0"),
|
V(ControlPortFileGroupReadable,BOOL, "0"),
|
||||||
V(ControlPortWriteToFile, FILENAME, NULL),
|
V(ControlPortWriteToFile, FILENAME, NULL),
|
||||||
V(ControlSocket, LINELIST, NULL),
|
V(ControlSocket, LINELIST, NULL),
|
||||||
|
V(ControlSocketsGroupWritable, BOOL, "0"),
|
||||||
V(CookieAuthentication, BOOL, "0"),
|
V(CookieAuthentication, BOOL, "0"),
|
||||||
V(CookieAuthFileGroupReadable, BOOL, "0"),
|
V(CookieAuthFileGroupReadable, BOOL, "0"),
|
||||||
V(CookieAuthFile, STRING, NULL),
|
V(CookieAuthFile, STRING, NULL),
|
||||||
@ -974,9 +975,15 @@ options_act_reversible(or_options_t *old_options, char **msg)
|
|||||||
}
|
}
|
||||||
|
|
||||||
#ifndef HAVE_SYS_UN_H
|
#ifndef HAVE_SYS_UN_H
|
||||||
if (options->ControlSocket) {
|
if (options->ControlSocket || options->ControlSocketsGroupWritable) {
|
||||||
*msg = tor_strdup("Unix domain sockets (ControlSocket) not supported"
|
*msg = tor_strdup("Unix domain sockets (ControlSocket) not supported "
|
||||||
" on this OS/with this build.");
|
"on this OS/with this build.");
|
||||||
|
goto rollback;
|
||||||
|
}
|
||||||
|
#else
|
||||||
|
if (options->ControlSocketsGroupWritable && !options->ControlSocket) {
|
||||||
|
*msg = tor_strdup("Setting ControlSocketGroupWritable without setting"
|
||||||
|
"a ControlSocket makes no sense.");
|
||||||
goto rollback;
|
goto rollback;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
@ -896,6 +896,43 @@ warn_too_many_conns(void)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef HAVE_SYS_UN_H
|
||||||
|
/** Check whether we should be willing to open an AF_UNIX socket in
|
||||||
|
* <b>path</b>. Return 0 if we should go ahead and -1 if we shouldn't. */
|
||||||
|
static int
|
||||||
|
check_location_for_unix_socket(or_options_t *options, const char *path)
|
||||||
|
{
|
||||||
|
int r = -1;
|
||||||
|
char *p = tor_strdup(path);
|
||||||
|
cpd_check_t flags = CPD_CHECK_MODE_ONLY;
|
||||||
|
if (get_parent_directory(p)<0)
|
||||||
|
goto done;
|
||||||
|
|
||||||
|
if (options->ControlSocketsGroupWritable)
|
||||||
|
flags |= CPD_GROUP_OK;
|
||||||
|
|
||||||
|
if (check_private_dir(p, flags) < 0) {
|
||||||
|
char *escpath, *escdir;
|
||||||
|
escpath = esc_for_log(path);
|
||||||
|
escdir = esc_for_log(p);
|
||||||
|
log_warn(LD_GENERAL, "Before Tor can create a control socket in %s, the "
|
||||||
|
"directory %s needs to exist, and to be accessible only by the "
|
||||||
|
"user%s account that is running Tor. (On some Unix systems, "
|
||||||
|
"anybody who can list a socket can conect to it, so Tor is "
|
||||||
|
"being careful.)", escpath, escdir,
|
||||||
|
options->ControlSocketsGroupWritable ? " and group" : "");
|
||||||
|
tor_free(escpath);
|
||||||
|
tor_free(escdir);
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
|
||||||
|
r = 0;
|
||||||
|
done:
|
||||||
|
tor_free(p);
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
/** Bind a new non-blocking socket listening to the socket described
|
/** Bind a new non-blocking socket listening to the socket described
|
||||||
* by <b>listensockaddr</b>.
|
* by <b>listensockaddr</b>.
|
||||||
*
|
*
|
||||||
@ -990,6 +1027,9 @@ connection_create_listener(const struct sockaddr *listensockaddr,
|
|||||||
* and listeners at the same time */
|
* and listeners at the same time */
|
||||||
tor_assert(type == CONN_TYPE_CONTROL_LISTENER);
|
tor_assert(type == CONN_TYPE_CONTROL_LISTENER);
|
||||||
|
|
||||||
|
if (check_location_for_unix_socket(get_options(), address) < 0)
|
||||||
|
goto err;
|
||||||
|
|
||||||
log_notice(LD_NET, "Opening %s on %s",
|
log_notice(LD_NET, "Opening %s on %s",
|
||||||
conn_type_to_string(type), address);
|
conn_type_to_string(type), address);
|
||||||
|
|
||||||
@ -1009,6 +1049,15 @@ connection_create_listener(const struct sockaddr *listensockaddr,
|
|||||||
tor_socket_strerror(tor_socket_errno(s)));
|
tor_socket_strerror(tor_socket_errno(s)));
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
if (get_options()->ControlSocketsGroupWritable) {
|
||||||
|
/* We need to use chmod; fchmod doesn't work on sockets on all
|
||||||
|
* platforms. */
|
||||||
|
if (chmod(address, 0660) < 0) {
|
||||||
|
log_warn(LD_FS,"Unable to make %s group-writable.", address);
|
||||||
|
tor_close_socket(s);
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (listen(s,SOMAXCONN) < 0) {
|
if (listen(s,SOMAXCONN) < 0) {
|
||||||
log_warn(LD_NET, "Could not listen on %s: %s", address,
|
log_warn(LD_NET, "Could not listen on %s: %s", address,
|
||||||
|
@ -2611,6 +2611,7 @@ typedef struct {
|
|||||||
int ControlPort; /**< Port to listen on for control connections. */
|
int ControlPort; /**< Port to listen on for control connections. */
|
||||||
config_line_t *ControlSocket; /**< List of Unix Domain Sockets to listen on
|
config_line_t *ControlSocket; /**< List of Unix Domain Sockets to listen on
|
||||||
* for control connections. */
|
* for control connections. */
|
||||||
|
int ControlSocketsGroupWritable; /**< Boolean: Are control sockets g+rw? */
|
||||||
int DirPort; /**< Port to listen on for directory connections. */
|
int DirPort; /**< Port to listen on for directory connections. */
|
||||||
int DNSPort; /**< Port to listen on for DNS requests. */
|
int DNSPort; /**< Port to listen on for DNS requests. */
|
||||||
int AssumeReachable; /**< Whether to publish our descriptor regardless. */
|
int AssumeReachable; /**< Whether to publish our descriptor regardless. */
|
||||||
|
@ -1208,6 +1208,35 @@ test_util_listdir(void *ptr)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_util_parent_dir(void *ptr)
|
||||||
|
{
|
||||||
|
char *cp;
|
||||||
|
(void)ptr;
|
||||||
|
|
||||||
|
#define T(input,expect_ok,output) \
|
||||||
|
do { \
|
||||||
|
int ok; \
|
||||||
|
cp = tor_strdup(input); \
|
||||||
|
ok = get_parent_directory(cp); \
|
||||||
|
tt_int_op(ok, ==, expect_ok); \
|
||||||
|
if (ok==0) \
|
||||||
|
tt_str_op(cp, ==, output); \
|
||||||
|
tor_free(cp); \
|
||||||
|
} while (0);
|
||||||
|
|
||||||
|
T("/home/wombat/knish", 0, "/home/wombat");
|
||||||
|
T("/home/wombat/knish/", 0, "/home/wombat");
|
||||||
|
T("./home/wombat/knish/", 0, "./home/wombat");
|
||||||
|
T("./wombat", 0, ".");
|
||||||
|
T("", -1, "");
|
||||||
|
T("/", -1, "");
|
||||||
|
T("////", -1, "");
|
||||||
|
|
||||||
|
done:
|
||||||
|
tor_free(cp);
|
||||||
|
}
|
||||||
|
|
||||||
#ifdef MS_WINDOWS
|
#ifdef MS_WINDOWS
|
||||||
static void
|
static void
|
||||||
test_util_load_win_lib(void *ptr)
|
test_util_load_win_lib(void *ptr)
|
||||||
@ -1495,6 +1524,7 @@ struct testcase_t util_tests[] = {
|
|||||||
UTIL_TEST(find_str_at_start_of_line, 0),
|
UTIL_TEST(find_str_at_start_of_line, 0),
|
||||||
UTIL_TEST(asprintf, 0),
|
UTIL_TEST(asprintf, 0),
|
||||||
UTIL_TEST(listdir, 0),
|
UTIL_TEST(listdir, 0),
|
||||||
|
UTIL_TEST(parent_dir, 0),
|
||||||
#ifdef MS_WINDOWS
|
#ifdef MS_WINDOWS
|
||||||
UTIL_TEST(load_win_lib, 0),
|
UTIL_TEST(load_win_lib, 0),
|
||||||
#endif
|
#endif
|
||||||
|
Loading…
Reference in New Issue
Block a user