aboutsummaryrefslogtreecommitdiffstats
path: root/src/security.c
blob: 33342fc702962c8b68d92ba32f9c4b9657e6b4bd (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
/**
 * cerberus – Minimal login program
 * 
 * Copyright © 2013  Mattias Andrée (maandree@member.fsf.org)
 * 
 * This program is free software: you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation, either version 3 of the License, or
 * (at your option) any later version.
 * 
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 * 
 * You should have received a copy of the GNU General Public License
 * along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
#include "security.h"


static inline void fail(char* str)
{
  perror(str);
  sleep(FAILURE_SLEEP);
  _exit(1);
}


/**
 * Secure the TTY from spying
 */
void secure_tty(void)
{
  struct termios tty;
  struct termios saved_tty;
  char* tty_device;
  int fd, i;
  
  /* Set ownership of this TTY to root:root */
  chown_tty(0, -1, 1);
  
  /* Get TTY name for last part of this functions */
  tty_device = ttyname(STDIN_FILENO);
  
  /* Kill other processes on this TTY */
  tcgetattr(STDIN_FILENO, &tty);
  saved_tty = tty;
  tty.c_cflag &= ~HUPCL;
  tcsetattr(0, TCSANOW, &tty);
  close(STDIN_FILENO);
  close(STDOUT_FILENO);
  close(STDERR_FILENO);
  signal(SIGHUP, SIG_IGN);
  vhangup();
  signal(SIGHUP, SIG_DFL);
  
  /* Restore terminal and TTY modes */
  fd = open(tty_device, O_RDWR | O_NONBLOCK);
  if (fd == -1)
    fail("open");
  fcntl(fd, F_SETFL, fcntl(fd, F_GETFL) & ~O_NONBLOCK);
  for (i = 0; i < fd; i++)
    close(i);
  for (i = 0; i < 3; i++)
    if (i != fd)
      dup2(fd, i);
  if (fd > 2)
    close(fd);
  tcgetattr(STDIN_FILENO, &saved_tty);
}


/**
 * Set ownership and mode of the TTY
 * 
 * @param  owner      The owner, -1 for unchanged
 * @param  group      The group, -1 for unchanged
 * @param  with_fail  Abort on failure
 */
void chown_tty(uid_t owner, gid_t group, int with_fail) 
{
  struct vt_stat vtstat;
  
  /* Set ownership of this TTY */
  if (fchown(STDIN_FILENO, owner, group) && with_fail)
    fail("fchown");
  
  /* Restrict others from using this TTY */
  if (fchmod(STDIN_FILENO, TTY_PERM) && with_fail)
    fail("fchmod");
  
  /* Also do the above for /dev/vcs[a][0-9]+ */
  if (ioctl(STDIN_FILENO, VT_GETSTATE, &vtstat) == 0)
    {
      int n = vtstat.v_active;
      char vcs[16];
      char vcsa[16];
      
      vcs += 16;
      vcsa += 16;
      
      if (n)
	{
	  *--vcs = *--vcsa = 0;
	  while (n)
	    {
	      *--vcs = *--vcsa = (n % 10) + '0';
	      n /= 10;
	    }
	  
	  vcs -= 8;
	  vcsa -= 9;
	  strcpy(vcs,  "/dev/vcs");
	  strcpy(vcsa, "/dev/vcsa");
	  
	  if (fchown(vcs,  owner, group) && with_fail)  fail("chown");
	  if (fchown(vcsa, owner, group) && with_fail)  fail("chown");
	  if (fchmod(vcs,  TTY_PERM) && with_fail)  fail("chmod");
	  if (fchmod(vcsa, TTY_PERM) && with_fail)  fail("chmod");
	}
    }
}