/* NetworkManager system settings service * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License along * with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. * * (C) Copyright 2010 - 2018 Red Hat, Inc. */ #include "nm-default.h" #include "nms-keyfile-utils.h" #include #include #include "nm-keyfile-internal.h" #include "nm-utils.h" #include "nm-setting-wired.h" #include "nm-setting-wireless.h" #include "nm-setting-wireless-security.h" #include "nm-config.h" /*****************************************************************************/ const char * nms_keyfile_nmmeta_check_filename (const char *filename, guint *out_uuid_len) { const char *uuid; const char *s; gsize len; s = strrchr (filename, '/'); if (s) filename = &s[1]; len = strlen (filename); if ( len <= NM_STRLEN (NM_KEYFILE_PATH_SUFFIX_NMMETA) || memcmp (&filename[len - NM_STRLEN (NM_KEYFILE_PATH_SUFFIX_NMMETA)], NM_KEYFILE_PATH_SUFFIX_NMMETA, NM_STRLEN (NM_KEYFILE_PATH_SUFFIX_NMMETA)) != 0) { /* the filename does not have the right suffix. */ return NULL; } len -= NM_STRLEN (NM_KEYFILE_PATH_SUFFIX_NMMETA); if (!NM_IN_SET (len, 36, 40)) { /* the remaining part of the filename has not the right length to * contain a UUID (according to nm_utils_is_uuid()). */ return NULL; } uuid = nm_strndup_a (100, filename, len, NULL); if (!nm_utils_is_uuid (uuid)) return NULL; NM_SET_OUT (out_uuid_len, len); return filename; } char * nms_keyfile_nmmeta_filename (const char *dirname, const char *uuid, gboolean temporary) { char filename[250]; char *s; nm_assert (dirname && dirname[0] == '/'); nm_assert ( nm_utils_is_uuid (uuid) && !strchr (uuid, '/')); if (g_snprintf (filename, sizeof (filename), "%s%s%s", uuid, NM_KEYFILE_PATH_SUFFIX_NMMETA, temporary ? "~" : "") >= sizeof (filename)) { /* valid uuids are limited in length (nm_utils_is_uuid). The buffer should always * be large enough. */ nm_assert_not_reached (); } s = g_build_filename (dirname, filename, NULL); nm_assert (nm_keyfile_utils_ignore_filename (s, FALSE)); return s; } gboolean nms_keyfile_nmmeta_read (const char *dirname, const char *filename, char **out_full_filename, char **out_uuid, char **out_loaded_path, struct stat *out_st) { const char *uuid; guint uuid_len; gs_free char *full_filename = NULL; gs_free char *ln = NULL; nm_assert (dirname && dirname[0] == '/'); nm_assert (filename && filename[0] && !strchr (filename, '/')); uuid = nms_keyfile_nmmeta_check_filename (filename, &uuid_len); if (!uuid) return FALSE; full_filename = g_build_filename (dirname, filename, NULL); if (!nms_keyfile_utils_check_file_permissions (NMS_KEYFILE_FILETYPE_NMMETA, full_filename, out_st, NULL)) return FALSE; ln = nm_utils_read_link_absolute (full_filename, NULL); if (!ln) return FALSE; NM_SET_OUT (out_uuid, g_strndup (uuid, uuid_len)); NM_SET_OUT (out_full_filename, g_steal_pointer (&full_filename)); NM_SET_OUT (out_loaded_path, g_steal_pointer (&ln)); return TRUE; } gboolean nms_keyfile_nmmeta_read_from_file (const char *full_filename, char **out_dirname, char **out_filename, char **out_uuid, char **out_loaded_path) { gs_free char *dirname = NULL; gs_free char *filename = NULL; nm_assert (full_filename && full_filename[0] == '/'); filename = g_path_get_basename (full_filename); dirname = g_path_get_dirname (full_filename); if (!nms_keyfile_nmmeta_read (dirname, filename, NULL, out_uuid, out_loaded_path, NULL)) return FALSE; NM_SET_OUT (out_dirname, g_steal_pointer (&dirname)); NM_SET_OUT (out_filename, g_steal_pointer (&filename)); return TRUE; } gboolean nms_keyfile_nmmeta_write (const char *dirname, const char *uuid, const char *loaded_path, gboolean allow_relative, char **out_full_filename) { gs_free char *full_filename_tmp = NULL; gs_free char *full_filename = NULL; nm_assert (dirname && dirname[0] == '/'); nm_assert ( nm_utils_is_uuid (uuid) && !strchr (uuid, '/')); nm_assert (!loaded_path || loaded_path[0] == '/'); full_filename_tmp = nms_keyfile_nmmeta_filename (dirname, uuid, TRUE); nm_assert (g_str_has_suffix (full_filename_tmp, "~")); nm_assert (nm_utils_file_is_in_path (full_filename_tmp, dirname)); (void) unlink (full_filename_tmp); if (!loaded_path) { gboolean success = TRUE; full_filename_tmp[strlen (full_filename_tmp) - 1] = '\0'; if (unlink (full_filename_tmp) != 0) success = NM_IN_SET (errno, ENOENT); NM_SET_OUT (out_full_filename, g_steal_pointer (&full_filename_tmp)); return success; } if (allow_relative) { const char *f; f = nm_utils_file_is_in_path (loaded_path, dirname); if (f) { /* @loaded_path points to a file directly in @dirname. * Don't use absolute paths. */ loaded_path = f; } } if (symlink (loaded_path, full_filename_tmp) != 0) { full_filename_tmp[strlen (full_filename_tmp) - 1] = '\0'; NM_SET_OUT (out_full_filename, g_steal_pointer (&full_filename_tmp)); return FALSE; } full_filename = g_strdup (full_filename_tmp); full_filename[strlen (full_filename) - 1] = '\0'; if (rename (full_filename_tmp, full_filename) != 0) { (void) unlink (full_filename_tmp); NM_SET_OUT (out_full_filename, g_steal_pointer (&full_filename)); return FALSE; } NM_SET_OUT (out_full_filename, g_steal_pointer (&full_filename)); return TRUE; } /*****************************************************************************/ gboolean nms_keyfile_utils_check_file_permissions_stat (NMSKeyfileFiletype filetype, const struct stat *st, GError **error) { g_return_val_if_fail (st, FALSE); if (filetype == NMS_KEYFILE_FILETYPE_KEYFILE) { if (!S_ISREG (st->st_mode)) { g_set_error_literal (error, NM_SETTINGS_ERROR, NM_SETTINGS_ERROR_INVALID_CONNECTION, "file is not a regular file"); return FALSE; } } else if (filetype == NMS_KEYFILE_FILETYPE_NMMETA) { if (!S_ISLNK (st->st_mode)) { g_set_error_literal (error, NM_SETTINGS_ERROR, NM_SETTINGS_ERROR_INVALID_CONNECTION, "file is not a slink"); return FALSE; } } else g_return_val_if_reached (FALSE); if (!NM_FLAGS_HAS (nm_utils_get_testing (), NM_UTILS_TEST_NO_KEYFILE_OWNER_CHECK)) { if (st->st_uid != 0) { g_set_error (error, NM_SETTINGS_ERROR, NM_SETTINGS_ERROR_INVALID_CONNECTION, "File owner (%lld) is insecure", (long long) st->st_uid); return FALSE; } if ( filetype == NMS_KEYFILE_FILETYPE_KEYFILE && (st->st_mode & 0077)) { g_set_error (error, NM_SETTINGS_ERROR, NM_SETTINGS_ERROR_INVALID_CONNECTION, "File permissions (%03o) are insecure", st->st_mode); return FALSE; } } return TRUE; } gboolean nms_keyfile_utils_check_file_permissions (NMSKeyfileFiletype filetype, const char *filename, struct stat *out_st, GError **error) { struct stat st; int errsv; g_return_val_if_fail (filename && filename[0] == '/', FALSE); if (filetype == NMS_KEYFILE_FILETYPE_KEYFILE) { if (stat (filename, &st) != 0) { errsv = errno; g_set_error (error, NM_SETTINGS_ERROR, NM_SETTINGS_ERROR_INVALID_CONNECTION, "cannot access file: %s", nm_strerror_native (errsv)); return FALSE; } } else if (filetype == NMS_KEYFILE_FILETYPE_NMMETA) { if (lstat (filename, &st) != 0) { errsv = errno; g_set_error (error, NM_SETTINGS_ERROR, NM_SETTINGS_ERROR_INVALID_CONNECTION, "cannot access file: %s", nm_strerror_native (errsv)); return FALSE; } } else g_return_val_if_reached (FALSE); if (!nms_keyfile_utils_check_file_permissions_stat (filetype, &st, error)) return FALSE; NM_SET_OUT (out_st, st); return TRUE; }