Home | History | Annotate | Line # | Download | only in pflogd
pflogd.c revision 1.1.1.3
      1 /*	$OpenBSD: pflogd.c,v 1.33 2005/02/09 12:09:30 henning Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 2001 Theo de Raadt
      5  * Copyright (c) 2001 Can Erkin Acar
      6  * All rights reserved.
      7  *
      8  * Redistribution and use in source and binary forms, with or without
      9  * modification, are permitted provided that the following conditions
     10  * are met:
     11  *
     12  *    - Redistributions of source code must retain the above copyright
     13  *      notice, this list of conditions and the following disclaimer.
     14  *    - Redistributions in binary form must reproduce the above
     15  *      copyright notice, this list of conditions and the following
     16  *      disclaimer in the documentation and/or other materials provided
     17  *      with the distribution.
     18  *
     19  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
     20  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
     21  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
     22  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
     23  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
     24  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
     25  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     26  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
     27  * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
     29  * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30  * POSSIBILITY OF SUCH DAMAGE.
     31  */
     32 
     33 #include <sys/types.h>
     34 #include <sys/ioctl.h>
     35 #include <sys/file.h>
     36 #include <sys/stat.h>
     37 #include <stdio.h>
     38 #include <stdlib.h>
     39 #include <string.h>
     40 #include <unistd.h>
     41 #include <pcap-int.h>
     42 #include <pcap.h>
     43 #include <syslog.h>
     44 #include <signal.h>
     45 #include <errno.h>
     46 #include <stdarg.h>
     47 #include <fcntl.h>
     48 #include <util.h>
     49 #include "pflogd.h"
     50 
     51 pcap_t *hpcap;
     52 static FILE *dpcap;
     53 
     54 int Debug = 0;
     55 static int snaplen = DEF_SNAPLEN;
     56 static int cur_snaplen = DEF_SNAPLEN;
     57 
     58 volatile sig_atomic_t gotsig_close, gotsig_alrm, gotsig_hup;
     59 
     60 char *filename = PFLOGD_LOG_FILE;
     61 char *interface = PFLOGD_DEFAULT_IF;
     62 char *filter = NULL;
     63 
     64 char errbuf[PCAP_ERRBUF_SIZE];
     65 
     66 int log_debug = 0;
     67 unsigned int delay = FLUSH_DELAY;
     68 
     69 char *copy_argv(char * const *);
     70 void  dump_packet(u_char *, const struct pcap_pkthdr *, const u_char *);
     71 void  dump_packet_nobuf(u_char *, const struct pcap_pkthdr *, const u_char *);
     72 int   flush_buffer(FILE *);
     73 int   init_pcap(void);
     74 void  logmsg(int, const char *, ...);
     75 void  purge_buffer(void);
     76 int   reset_dump(void);
     77 int   scan_dump(FILE *, off_t);
     78 int   set_snaplen(int);
     79 void  set_suspended(int);
     80 void  sig_alrm(int);
     81 void  sig_close(int);
     82 void  sig_hup(int);
     83 void  usage(void);
     84 
     85 /* buffer must always be greater than snaplen */
     86 static int    bufpkt = 0;	/* number of packets in buffer */
     87 static int    buflen = 0;	/* allocated size of buffer */
     88 static char  *buffer = NULL;	/* packet buffer */
     89 static char  *bufpos = NULL;	/* position in buffer */
     90 static int    bufleft = 0;	/* bytes left in buffer */
     91 
     92 /* if error, stop logging but count dropped packets */
     93 static int suspended = -1;
     94 static long packets_dropped = 0;
     95 
     96 void
     97 set_suspended(int s)
     98 {
     99 	if (suspended == s)
    100 		return;
    101 
    102 	suspended = s;
    103 	setproctitle("[%s] -s %d -f %s",
    104             suspended ? "suspended" : "running", cur_snaplen, filename);
    105 }
    106 
    107 char *
    108 copy_argv(char * const *argv)
    109 {
    110 	size_t len = 0, n;
    111 	char *buf;
    112 
    113 	if (argv == NULL)
    114 		return (NULL);
    115 
    116 	for (n = 0; argv[n]; n++)
    117 		len += strlen(argv[n])+1;
    118 	if (len == 0)
    119 		return (NULL);
    120 
    121 	buf = malloc(len);
    122 	if (buf == NULL)
    123 		return (NULL);
    124 
    125 	strlcpy(buf, argv[0], len);
    126 	for (n = 1; argv[n]; n++) {
    127 		strlcat(buf, " ", len);
    128 		strlcat(buf, argv[n], len);
    129 	}
    130 	return (buf);
    131 }
    132 
    133 void
    134 logmsg(int pri, const char *message, ...)
    135 {
    136 	va_list ap;
    137 	va_start(ap, message);
    138 
    139 	if (log_debug) {
    140 		vfprintf(stderr, message, ap);
    141 		fprintf(stderr, "\n");
    142 	} else
    143 		vsyslog(pri, message, ap);
    144 	va_end(ap);
    145 }
    146 
    147 __dead void
    148 usage(void)
    149 {
    150 	fprintf(stderr, "usage: pflogd [-Dx] [-d delay] [-f filename] ");
    151 	fprintf(stderr, "[-s snaplen] [expression]\n");
    152 	exit(1);
    153 }
    154 
    155 void
    156 sig_close(int sig)
    157 {
    158 	gotsig_close = 1;
    159 }
    160 
    161 void
    162 sig_hup(int sig)
    163 {
    164 	gotsig_hup = 1;
    165 }
    166 
    167 void
    168 sig_alrm(int sig)
    169 {
    170 	gotsig_alrm = 1;
    171 }
    172 
    173 void
    174 set_pcap_filter(void)
    175 {
    176 	struct bpf_program bprog;
    177 
    178 	if (pcap_compile(hpcap, &bprog, filter, PCAP_OPT_FIL, 0) < 0)
    179 		logmsg(LOG_WARNING, "%s", pcap_geterr(hpcap));
    180 	else {
    181 		if (pcap_setfilter(hpcap, &bprog) < 0)
    182 			logmsg(LOG_WARNING, "%s", pcap_geterr(hpcap));
    183 		pcap_freecode(&bprog);
    184 	}
    185 }
    186 
    187 int
    188 init_pcap(void)
    189 {
    190 	hpcap = pcap_open_live(interface, snaplen, 1, PCAP_TO_MS, errbuf);
    191 	if (hpcap == NULL) {
    192 		logmsg(LOG_ERR, "Failed to initialize: %s", errbuf);
    193 		return (-1);
    194 	}
    195 
    196 	if (pcap_datalink(hpcap) != DLT_PFLOG) {
    197 		logmsg(LOG_ERR, "Invalid datalink type");
    198 		pcap_close(hpcap);
    199 		hpcap = NULL;
    200 		return (-1);
    201 	}
    202 
    203 	set_pcap_filter();
    204 
    205 	cur_snaplen = snaplen = pcap_snapshot(hpcap);
    206 
    207 	/* lock */
    208 	if (ioctl(pcap_fileno(hpcap), BIOCLOCK) < 0) {
    209 		logmsg(LOG_ERR, "BIOCLOCK: %s", strerror(errno));
    210 		return (-1);
    211 	}
    212 
    213 	return (0);
    214 }
    215 
    216 int
    217 set_snaplen(int snap)
    218 {
    219 	if (priv_set_snaplen(snap))
    220 		return (1);
    221 
    222 	if (cur_snaplen > snap)
    223 		purge_buffer();
    224 
    225 	cur_snaplen = snap;
    226 
    227 	return (0);
    228 }
    229 
    230 int
    231 reset_dump(void)
    232 {
    233 	struct pcap_file_header hdr;
    234 	struct stat st;
    235 	int fd;
    236 	FILE *fp;
    237 
    238 	if (hpcap == NULL)
    239 		return (-1);
    240 
    241 	if (dpcap) {
    242 		flush_buffer(dpcap);
    243 		fclose(dpcap);
    244 		dpcap = NULL;
    245 	}
    246 
    247 	/*
    248 	 * Basically reimplement pcap_dump_open() because it truncates
    249 	 * files and duplicates headers and such.
    250 	 */
    251 	fd = priv_open_log();
    252 	if (fd < 0)
    253 		return (1);
    254 
    255 	fp = fdopen(fd, "a+");
    256 
    257 	if (fp == NULL) {
    258 		close(fd);
    259 		logmsg(LOG_ERR, "Error: %s: %s", filename, strerror(errno));
    260 		return (1);
    261 	}
    262 	if (fstat(fileno(fp), &st) == -1) {
    263 		fclose(fp);
    264 		logmsg(LOG_ERR, "Error: %s: %s", filename, strerror(errno));
    265 		return (1);
    266 	}
    267 
    268 	/* set FILE unbuffered, we do our own buffering */
    269 	if (setvbuf(fp, NULL, _IONBF, 0)) {
    270 		fclose(fp);
    271 		logmsg(LOG_ERR, "Failed to set output buffers");
    272 		return (1);
    273 	}
    274 
    275 #define TCPDUMP_MAGIC 0xa1b2c3d4
    276 
    277 	if (st.st_size == 0) {
    278 		if (snaplen != cur_snaplen) {
    279 			logmsg(LOG_NOTICE, "Using snaplen %d", snaplen);
    280 			if (set_snaplen(snaplen)) {
    281 				fclose(fp);
    282 				logmsg(LOG_WARNING,
    283 				    "Failed, using old settings");
    284 			}
    285 		}
    286 		hdr.magic = TCPDUMP_MAGIC;
    287 		hdr.version_major = PCAP_VERSION_MAJOR;
    288 		hdr.version_minor = PCAP_VERSION_MINOR;
    289 		hdr.thiszone = hpcap->tzoff;
    290 		hdr.snaplen = hpcap->snapshot;
    291 		hdr.sigfigs = 0;
    292 		hdr.linktype = hpcap->linktype;
    293 
    294 		if (fwrite((char *)&hdr, sizeof(hdr), 1, fp) != 1) {
    295 			fclose(fp);
    296 			return (1);
    297 		}
    298 	} else if (scan_dump(fp, st.st_size)) {
    299 		/* XXX move file and continue? */
    300 		fclose(fp);
    301 		return (1);
    302 	}
    303 
    304 	dpcap = fp;
    305 
    306 	set_suspended(0);
    307 	flush_buffer(fp);
    308 
    309 	return (0);
    310 }
    311 
    312 int
    313 scan_dump(FILE *fp, off_t size)
    314 {
    315 	struct pcap_file_header hdr;
    316 	struct pcap_pkthdr ph;
    317 	off_t pos;
    318 
    319 	/*
    320 	 * Must read the file, compare the header against our new
    321 	 * options (in particular, snaplen) and adjust our options so
    322 	 * that we generate a correct file. Furthermore, check the file
    323 	 * for consistency so that we can append safely.
    324 	 *
    325 	 * XXX this may take a long time for large logs.
    326 	 */
    327 	(void) fseek(fp, 0L, SEEK_SET);
    328 
    329 	if (fread((char *)&hdr, sizeof(hdr), 1, fp) != 1) {
    330 		logmsg(LOG_ERR, "Short file header");
    331 		return (1);
    332 	}
    333 
    334 	if (hdr.magic != TCPDUMP_MAGIC ||
    335 	    hdr.version_major != PCAP_VERSION_MAJOR ||
    336 	    hdr.version_minor != PCAP_VERSION_MINOR ||
    337 	    hdr.linktype != hpcap->linktype ||
    338 	    hdr.snaplen > PFLOGD_MAXSNAPLEN) {
    339 		logmsg(LOG_ERR, "Invalid/incompatible log file, move it away");
    340 		return (1);
    341 	}
    342 
    343 	pos = sizeof(hdr);
    344 
    345 	while (!feof(fp)) {
    346 		off_t len = fread((char *)&ph, 1, sizeof(ph), fp);
    347 		if (len == 0)
    348 			break;
    349 
    350 		if (len != sizeof(ph))
    351 			goto error;
    352 		if (ph.caplen > hdr.snaplen || ph.caplen > PFLOGD_MAXSNAPLEN)
    353 			goto error;
    354 		pos += sizeof(ph) + ph.caplen;
    355 		if (pos > size)
    356 			goto error;
    357 		fseek(fp, ph.caplen, SEEK_CUR);
    358 	}
    359 
    360 	if (pos != size)
    361 		goto error;
    362 
    363 	if (hdr.snaplen != cur_snaplen) {
    364 		logmsg(LOG_WARNING,
    365 		       "Existing file has different snaplen %u, using it",
    366 		       hdr.snaplen);
    367 		if (set_snaplen(hdr.snaplen)) {
    368 			logmsg(LOG_WARNING,
    369 			       "Failed, using old settings, offset %llu",
    370 			       (unsigned long long) size);
    371 		}
    372 	}
    373 
    374 	return (0);
    375 
    376  error:
    377 	logmsg(LOG_ERR, "Corrupted log file.");
    378 	return (1);
    379 }
    380 
    381 /* dump a packet directly to the stream, which is unbuffered */
    382 void
    383 dump_packet_nobuf(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
    384 {
    385 	FILE *f = (FILE *)user;
    386 
    387 	if (suspended) {
    388 		packets_dropped++;
    389 		return;
    390 	}
    391 
    392 	if (fwrite((char *)h, sizeof(*h), 1, f) != 1) {
    393 		off_t pos = ftello(f);
    394 
    395 		/* try to undo header to prevent corruption */
    396 		if (pos < sizeof(*h) ||
    397 		    ftruncate(fileno(f), pos - sizeof(*h))) {
    398 			logmsg(LOG_ERR, "Write failed, corrupted logfile!");
    399 			set_suspended(1);
    400 			gotsig_close = 1;
    401 			return;
    402 		}
    403 		goto error;
    404 	}
    405 
    406 	if (fwrite((char *)sp, h->caplen, 1, f) != 1)
    407 		goto error;
    408 
    409 	return;
    410 
    411 error:
    412 	set_suspended(1);
    413 	packets_dropped ++;
    414 	logmsg(LOG_ERR, "Logging suspended: fwrite: %s", strerror(errno));
    415 }
    416 
    417 int
    418 flush_buffer(FILE *f)
    419 {
    420 	off_t offset;
    421 	int len = bufpos - buffer;
    422 
    423 	if (len <= 0)
    424 		return (0);
    425 
    426 	offset = ftello(f);
    427 	if (offset == (off_t)-1) {
    428 		set_suspended(1);
    429 		logmsg(LOG_ERR, "Logging suspended: ftello: %s",
    430 		    strerror(errno));
    431 		return (1);
    432 	}
    433 
    434 	if (fwrite(buffer, len, 1, f) != 1) {
    435 		set_suspended(1);
    436 		logmsg(LOG_ERR, "Logging suspended: fwrite: %s",
    437 		    strerror(errno));
    438 		ftruncate(fileno(f), offset);
    439 		return (1);
    440 	}
    441 
    442 	set_suspended(0);
    443 	bufpos = buffer;
    444 	bufleft = buflen;
    445 	bufpkt = 0;
    446 
    447 	return (0);
    448 }
    449 
    450 void
    451 purge_buffer(void)
    452 {
    453 	packets_dropped += bufpkt;
    454 
    455 	set_suspended(0);
    456 	bufpos = buffer;
    457 	bufleft = buflen;
    458 	bufpkt = 0;
    459 }
    460 
    461 /* append packet to the buffer, flushing if necessary */
    462 void
    463 dump_packet(u_char *user, const struct pcap_pkthdr *h, const u_char *sp)
    464 {
    465 	FILE *f = (FILE *)user;
    466 	size_t len = sizeof(*h) + h->caplen;
    467 
    468 	if (len < sizeof(*h) || h->caplen > (size_t)cur_snaplen) {
    469 		logmsg(LOG_NOTICE, "invalid size %u (%u/%u), packet dropped",
    470 		       len, cur_snaplen, snaplen);
    471 		packets_dropped++;
    472 		return;
    473 	}
    474 
    475 	if (len <= bufleft)
    476 		goto append;
    477 
    478 	if (suspended) {
    479 		packets_dropped++;
    480 		return;
    481 	}
    482 
    483 	if (flush_buffer(f)) {
    484 		packets_dropped++;
    485 		return;
    486 	}
    487 
    488 	if (len > bufleft) {
    489 		dump_packet_nobuf(user, h, sp);
    490 		return;
    491 	}
    492 
    493  append:
    494 	memcpy(bufpos, h, sizeof(*h));
    495 	memcpy(bufpos + sizeof(*h), sp, h->caplen);
    496 
    497 	bufpos += len;
    498 	bufleft -= len;
    499 	bufpkt++;
    500 
    501 	return;
    502 }
    503 
    504 int
    505 main(int argc, char **argv)
    506 {
    507 	struct pcap_stat pstat;
    508 	int ch, np, Xflag = 0;
    509 	pcap_handler phandler = dump_packet;
    510 	const char *errstr = NULL;
    511 
    512 	closefrom(STDERR_FILENO + 1);
    513 
    514 	while ((ch = getopt(argc, argv, "Dxd:s:f:")) != -1) {
    515 		switch (ch) {
    516 		case 'D':
    517 			Debug = 1;
    518 			break;
    519 		case 'd':
    520 			delay = strtonum(optarg, 5, 60*60, &errstr);
    521 			if (errstr)
    522 				usage();
    523 			break;
    524 		case 'f':
    525 			filename = optarg;
    526 			break;
    527 		case 's':
    528 			snaplen = strtonum(optarg, 0, PFLOGD_MAXSNAPLEN,
    529 			    &errstr);
    530 			if (snaplen <= 0)
    531 				snaplen = DEF_SNAPLEN;
    532 			if (errstr)
    533 				snaplen = PFLOGD_MAXSNAPLEN;
    534 			break;
    535 		case 'x':
    536 			Xflag++;
    537 			break;
    538 		default:
    539 			usage();
    540 		}
    541 
    542 	}
    543 
    544 	log_debug = Debug;
    545 	argc -= optind;
    546 	argv += optind;
    547 
    548 	if (!Debug) {
    549 		openlog("pflogd", LOG_PID | LOG_CONS, LOG_DAEMON);
    550 		if (daemon(0, 0)) {
    551 			logmsg(LOG_WARNING, "Failed to become daemon: %s",
    552 			    strerror(errno));
    553 		}
    554 		pidfile(NULL);
    555 	}
    556 
    557 	tzset();
    558 	(void)umask(S_IRWXG | S_IRWXO);
    559 
    560 	/* filter will be used by the privileged process */
    561 	if (argc) {
    562 		filter = copy_argv(argv);
    563 		if (filter == NULL)
    564 			logmsg(LOG_NOTICE, "Failed to form filter expression");
    565 	}
    566 
    567 	/* initialize pcap before dropping privileges */
    568 	if (init_pcap()) {
    569 		logmsg(LOG_ERR, "Exiting, init failure");
    570 		exit(1);
    571 	}
    572 
    573 	/* Privilege separation begins here */
    574 	if (priv_init()) {
    575 		logmsg(LOG_ERR, "unable to privsep");
    576 		exit(1);
    577 	}
    578 
    579 	setproctitle("[initializing]");
    580 	/* Process is now unprivileged and inside a chroot */
    581 	signal(SIGTERM, sig_close);
    582 	signal(SIGINT, sig_close);
    583 	signal(SIGQUIT, sig_close);
    584 	signal(SIGALRM, sig_alrm);
    585 	signal(SIGHUP, sig_hup);
    586 	alarm(delay);
    587 
    588 	buffer = malloc(PFLOGD_BUFSIZE);
    589 
    590 	if (buffer == NULL) {
    591 		logmsg(LOG_WARNING, "Failed to allocate output buffer");
    592 		phandler = dump_packet_nobuf;
    593 	} else {
    594 		bufleft = buflen = PFLOGD_BUFSIZE;
    595 		bufpos = buffer;
    596 		bufpkt = 0;
    597 	}
    598 
    599 	if (reset_dump()) {
    600 		if (Xflag)
    601 			return (1);
    602 
    603 		logmsg(LOG_ERR, "Logging suspended: open error");
    604 		set_suspended(1);
    605 	} else if (Xflag)
    606 		return (0);
    607 
    608 	while (1) {
    609 		np = pcap_dispatch(hpcap, PCAP_NUM_PKTS,
    610 		    phandler, (u_char *)dpcap);
    611 		if (np < 0)
    612 			logmsg(LOG_NOTICE, "%s", pcap_geterr(hpcap));
    613 
    614 		if (gotsig_close)
    615 			break;
    616 		if (gotsig_hup) {
    617 			if (reset_dump()) {
    618 				logmsg(LOG_ERR,
    619 				    "Logging suspended: open error");
    620 				set_suspended(1);
    621 			}
    622 			gotsig_hup = 0;
    623 		}
    624 
    625 		if (gotsig_alrm) {
    626 			if (dpcap)
    627 				flush_buffer(dpcap);
    628 			gotsig_alrm = 0;
    629 			alarm(delay);
    630 		}
    631 	}
    632 
    633 	logmsg(LOG_NOTICE, "Exiting");
    634 	if (dpcap) {
    635 		flush_buffer(dpcap);
    636 		fclose(dpcap);
    637 	}
    638 	purge_buffer();
    639 
    640 	if (pcap_stats(hpcap, &pstat) < 0)
    641 		logmsg(LOG_WARNING, "Reading stats: %s", pcap_geterr(hpcap));
    642 	else
    643 		logmsg(LOG_NOTICE,
    644 		    "%u packets received, %u/%u dropped (kernel/pflogd)",
    645 		    pstat.ps_recv, pstat.ps_drop, packets_dropped);
    646 
    647 	pcap_close(hpcap);
    648 	if (!Debug)
    649 		closelog();
    650 	return (0);
    651 }
    652