[e16e8f2] | 1 | #include <stdio.h> |
---|
| 2 | #include <stdlib.h> |
---|
| 3 | #include <unistd.h> |
---|
| 4 | #include <string.h> |
---|
| 5 | #include <stdarg.h> |
---|
| 6 | #include <errno.h> |
---|
| 7 | #include <fcntl.h> |
---|
| 8 | #include <libgen.h> |
---|
| 9 | #include <signal.h> |
---|
| 10 | #include <net/if.h> |
---|
| 11 | #include <net/ethernet.h> |
---|
| 12 | #include <sys/select.h> |
---|
| 13 | #include <sys/socket.h> |
---|
| 14 | #include <sys/stat.h> |
---|
| 15 | #include <sys/un.h> |
---|
| 16 | #include <syslog.h> |
---|
| 17 | #include <getopt.h> |
---|
| 18 | #include <pcap.h> |
---|
| 19 | |
---|
| 20 | #define SNAPLEN 1600 |
---|
| 21 | |
---|
| 22 | /* |
---|
| 23 | * FIXME: is there a way to detect the version of the libpcap library? |
---|
| 24 | * Version 0.9 has pcap_inject; version 0.8 doesn't, but both report |
---|
| 25 | * their version number as 2.4. |
---|
| 26 | */ |
---|
| 27 | #define HAVE_PCAP_INJECT 0 |
---|
| 28 | |
---|
| 29 | struct hijack { |
---|
| 30 | pcap_t *pcap; |
---|
| 31 | int fd; |
---|
| 32 | int datalink; |
---|
| 33 | int filtered; |
---|
| 34 | unsigned long rx_count; |
---|
| 35 | unsigned long tx_count; |
---|
| 36 | }; |
---|
| 37 | |
---|
| 38 | struct hijack_listener { |
---|
| 39 | struct sockaddr_un sun; |
---|
| 40 | int fd; |
---|
| 41 | }; |
---|
| 42 | |
---|
| 43 | struct hijack_options { |
---|
| 44 | char interface[IF_NAMESIZE]; |
---|
| 45 | int daemonise; |
---|
| 46 | }; |
---|
| 47 | |
---|
| 48 | static int daemonised = 0; |
---|
| 49 | |
---|
| 50 | static int signalled = 0; |
---|
| 51 | |
---|
| 52 | static void flag_signalled ( int signal __attribute__ (( unused )) ) { |
---|
| 53 | signalled = 1; |
---|
| 54 | } |
---|
| 55 | |
---|
| 56 | #if ! HAVE_PCAP_INJECT |
---|
| 57 | /** |
---|
| 58 | * Substitute for pcap_inject(), if this version of libpcap doesn't |
---|
| 59 | * have it. Will almost certainly only work under Linux. |
---|
| 60 | * |
---|
| 61 | */ |
---|
| 62 | int pcap_inject ( pcap_t *pcap, const void *data, size_t len ) { |
---|
| 63 | int fd; |
---|
| 64 | char *errbuf = pcap_geterr ( pcap ); |
---|
| 65 | |
---|
| 66 | fd = pcap_get_selectable_fd ( pcap ); |
---|
| 67 | if ( fd < 0 ) { |
---|
| 68 | snprintf ( errbuf, PCAP_ERRBUF_SIZE, |
---|
| 69 | "could not get file descriptor" ); |
---|
| 70 | return -1; |
---|
| 71 | } |
---|
| 72 | if ( write ( fd, data, len ) != len ) { |
---|
| 73 | snprintf ( errbuf, PCAP_ERRBUF_SIZE, |
---|
| 74 | "could not write data: %s", strerror ( errno ) ); |
---|
| 75 | return -1; |
---|
| 76 | } |
---|
| 77 | return len; |
---|
| 78 | } |
---|
| 79 | #endif /* ! HAVE_PCAP_INJECT */ |
---|
| 80 | |
---|
| 81 | /** |
---|
| 82 | * Log error message |
---|
| 83 | * |
---|
| 84 | */ |
---|
| 85 | static __attribute__ (( format ( printf, 2, 3 ) )) void |
---|
| 86 | logmsg ( int level, const char *format, ... ) { |
---|
| 87 | va_list ap; |
---|
| 88 | |
---|
| 89 | va_start ( ap, format ); |
---|
| 90 | if ( daemonised ) { |
---|
| 91 | vsyslog ( ( LOG_DAEMON | level ), format, ap ); |
---|
| 92 | } else { |
---|
| 93 | vfprintf ( stderr, format, ap ); |
---|
| 94 | } |
---|
| 95 | va_end ( ap ); |
---|
| 96 | } |
---|
| 97 | |
---|
| 98 | /** |
---|
| 99 | * Open pcap device |
---|
| 100 | * |
---|
| 101 | */ |
---|
| 102 | static int hijack_open ( const char *interface, struct hijack *hijack ) { |
---|
| 103 | char errbuf[PCAP_ERRBUF_SIZE]; |
---|
| 104 | |
---|
| 105 | /* Open interface via pcap */ |
---|
| 106 | errbuf[0] = '\0'; |
---|
| 107 | hijack->pcap = pcap_open_live ( interface, SNAPLEN, 1, 0, errbuf ); |
---|
| 108 | if ( ! hijack->pcap ) { |
---|
| 109 | logmsg ( LOG_ERR, "Failed to open %s: %s\n", |
---|
| 110 | interface, errbuf ); |
---|
| 111 | goto err; |
---|
| 112 | } |
---|
| 113 | if ( errbuf[0] ) |
---|
| 114 | logmsg ( LOG_WARNING, "Warning: %s\n", errbuf ); |
---|
| 115 | |
---|
| 116 | /* Set capture interface to non-blocking mode */ |
---|
| 117 | if ( pcap_setnonblock ( hijack->pcap, 1, errbuf ) < 0 ) { |
---|
| 118 | logmsg ( LOG_ERR, "Could not make %s non-blocking: %s\n", |
---|
| 119 | interface, errbuf ); |
---|
| 120 | goto err; |
---|
| 121 | } |
---|
| 122 | |
---|
| 123 | /* Get file descriptor for select() */ |
---|
| 124 | hijack->fd = pcap_get_selectable_fd ( hijack->pcap ); |
---|
| 125 | if ( hijack->fd < 0 ) { |
---|
| 126 | logmsg ( LOG_ERR, "Cannot get selectable file descriptor " |
---|
| 127 | "for %s\n", interface ); |
---|
| 128 | goto err; |
---|
| 129 | } |
---|
| 130 | |
---|
| 131 | /* Get link layer type */ |
---|
| 132 | hijack->datalink = pcap_datalink ( hijack->pcap ); |
---|
| 133 | |
---|
| 134 | return 0; |
---|
| 135 | |
---|
| 136 | err: |
---|
| 137 | if ( hijack->pcap ) |
---|
| 138 | pcap_close ( hijack->pcap ); |
---|
| 139 | return -1; |
---|
| 140 | } |
---|
| 141 | |
---|
| 142 | /** |
---|
| 143 | * Close pcap device |
---|
| 144 | * |
---|
| 145 | */ |
---|
| 146 | static void hijack_close ( struct hijack *hijack ) { |
---|
| 147 | pcap_close ( hijack->pcap ); |
---|
| 148 | } |
---|
| 149 | |
---|
| 150 | /** |
---|
| 151 | * Install filter for hijacked connection |
---|
| 152 | * |
---|
| 153 | */ |
---|
| 154 | static int hijack_install_filter ( struct hijack *hijack, |
---|
| 155 | char *filter ) { |
---|
| 156 | struct bpf_program program; |
---|
| 157 | |
---|
| 158 | /* Compile filter */ |
---|
| 159 | if ( pcap_compile ( hijack->pcap, &program, filter, 1, 0 ) < 0 ) { |
---|
| 160 | logmsg ( LOG_ERR, "could not compile filter \"%s\": %s\n", |
---|
| 161 | filter, pcap_geterr ( hijack->pcap ) ); |
---|
| 162 | goto err_nofree; |
---|
| 163 | } |
---|
| 164 | |
---|
| 165 | /* Install filter */ |
---|
| 166 | if ( pcap_setfilter ( hijack->pcap, &program ) < 0 ) { |
---|
| 167 | logmsg ( LOG_ERR, "could not install filter \"%s\": %s\n", |
---|
| 168 | filter, pcap_geterr ( hijack->pcap ) ); |
---|
| 169 | goto err; |
---|
| 170 | } |
---|
| 171 | |
---|
| 172 | logmsg ( LOG_INFO, "using filter \"%s\"\n", filter ); |
---|
| 173 | |
---|
| 174 | pcap_freecode ( &program ); |
---|
| 175 | return 0; |
---|
| 176 | |
---|
| 177 | err: |
---|
| 178 | pcap_freecode ( &program ); |
---|
| 179 | err_nofree: |
---|
| 180 | return -1; |
---|
| 181 | } |
---|
| 182 | |
---|
| 183 | /** |
---|
| 184 | * Set up filter for hijacked ethernet connection |
---|
| 185 | * |
---|
| 186 | */ |
---|
| 187 | static int hijack_filter_ethernet ( struct hijack *hijack, const char *buf, |
---|
| 188 | size_t len ) { |
---|
| 189 | char filter[55]; /* see format string */ |
---|
| 190 | struct ether_header *ether_header = ( struct ether_header * ) buf; |
---|
| 191 | unsigned char *hwaddr = ether_header->ether_shost; |
---|
| 192 | |
---|
| 193 | if ( len < sizeof ( *ether_header ) ) |
---|
| 194 | return -1; |
---|
| 195 | |
---|
| 196 | snprintf ( filter, sizeof ( filter ), "broadcast or multicast or " |
---|
| 197 | "ether host %02x:%02x:%02x:%02x:%02x:%02x", hwaddr[0], |
---|
| 198 | hwaddr[1], hwaddr[2], hwaddr[3], hwaddr[4], hwaddr[5] ); |
---|
| 199 | |
---|
| 200 | return hijack_install_filter ( hijack, filter ); |
---|
| 201 | } |
---|
| 202 | |
---|
| 203 | /** |
---|
| 204 | * Set up filter for hijacked connection |
---|
| 205 | * |
---|
| 206 | */ |
---|
| 207 | static int hijack_filter ( struct hijack *hijack, const char *buf, |
---|
| 208 | size_t len ) { |
---|
| 209 | switch ( hijack->datalink ) { |
---|
| 210 | case DLT_EN10MB: |
---|
| 211 | return hijack_filter_ethernet ( hijack, buf, len ); |
---|
| 212 | default: |
---|
| 213 | logmsg ( LOG_ERR, "unsupported protocol %s: cannot filter\n", |
---|
| 214 | ( pcap_datalink_val_to_name ( hijack->datalink ) ? |
---|
| 215 | pcap_datalink_val_to_name ( hijack->datalink ) : |
---|
| 216 | "UNKNOWN" ) ); |
---|
| 217 | /* Return success so we don't get called again */ |
---|
| 218 | return 0; |
---|
| 219 | } |
---|
| 220 | } |
---|
| 221 | |
---|
| 222 | /** |
---|
| 223 | * Forward data from hijacker |
---|
| 224 | * |
---|
| 225 | */ |
---|
| 226 | static ssize_t forward_from_hijacker ( struct hijack *hijack, int fd ) { |
---|
| 227 | char buf[SNAPLEN]; |
---|
| 228 | ssize_t len; |
---|
| 229 | |
---|
| 230 | /* Read packet from hijacker */ |
---|
| 231 | len = read ( fd, buf, sizeof ( buf ) ); |
---|
| 232 | if ( len < 0 ) { |
---|
| 233 | logmsg ( LOG_ERR, "read from hijacker failed: %s\n", |
---|
| 234 | strerror ( errno ) ); |
---|
| 235 | return -1; |
---|
| 236 | } |
---|
| 237 | if ( len == 0 ) |
---|
| 238 | return 0; |
---|
| 239 | |
---|
| 240 | /* Set up filter if not already in place */ |
---|
| 241 | if ( ! hijack->filtered ) { |
---|
| 242 | if ( hijack_filter ( hijack, buf, len ) == 0 ) |
---|
| 243 | hijack->filtered = 1; |
---|
| 244 | } |
---|
| 245 | |
---|
| 246 | /* Transmit packet to network */ |
---|
| 247 | if ( pcap_inject ( hijack->pcap, buf, len ) != len ) { |
---|
| 248 | logmsg ( LOG_ERR, "write to hijacked port failed: %s\n", |
---|
| 249 | pcap_geterr ( hijack->pcap ) ); |
---|
| 250 | return -1; |
---|
| 251 | } |
---|
| 252 | |
---|
| 253 | hijack->tx_count++; |
---|
| 254 | return len; |
---|
| 255 | }; |
---|
| 256 | |
---|
| 257 | /** |
---|
| 258 | * Forward data to hijacker |
---|
| 259 | * |
---|
| 260 | */ |
---|
| 261 | static ssize_t forward_to_hijacker ( int fd, struct hijack *hijack ) { |
---|
| 262 | struct pcap_pkthdr *pkt_header; |
---|
| 263 | const unsigned char *pkt_data; |
---|
| 264 | ssize_t len; |
---|
| 265 | |
---|
| 266 | /* Receive packet from network */ |
---|
| 267 | if ( pcap_next_ex ( hijack->pcap, &pkt_header, &pkt_data ) < 0 ) { |
---|
| 268 | logmsg ( LOG_ERR, "read from hijacked port failed: %s\n", |
---|
| 269 | pcap_geterr ( hijack->pcap ) ); |
---|
| 270 | return -1; |
---|
| 271 | } |
---|
| 272 | if ( pkt_header->caplen != pkt_header->len ) { |
---|
| 273 | logmsg ( LOG_ERR, "read partial packet (%d of %d bytes)\n", |
---|
| 274 | pkt_header->caplen, pkt_header->len ); |
---|
| 275 | return -1; |
---|
| 276 | } |
---|
| 277 | if ( pkt_header->caplen == 0 ) |
---|
| 278 | return 0; |
---|
| 279 | len = pkt_header->caplen; |
---|
| 280 | |
---|
| 281 | /* Write packet to hijacker */ |
---|
| 282 | if ( write ( fd, pkt_data, len ) != len ) { |
---|
| 283 | logmsg ( LOG_ERR, "write to hijacker failed: %s\n", |
---|
| 284 | strerror ( errno ) ); |
---|
| 285 | return -1; |
---|
| 286 | } |
---|
| 287 | |
---|
| 288 | hijack->rx_count++; |
---|
| 289 | return len; |
---|
| 290 | }; |
---|
| 291 | |
---|
| 292 | |
---|
| 293 | /** |
---|
| 294 | * Run hijacker |
---|
| 295 | * |
---|
| 296 | */ |
---|
| 297 | static int run_hijacker ( const char *interface, int fd ) { |
---|
| 298 | struct hijack hijack; |
---|
| 299 | fd_set fdset; |
---|
| 300 | int max_fd; |
---|
| 301 | ssize_t len; |
---|
| 302 | |
---|
| 303 | logmsg ( LOG_INFO, "new connection for %s\n", interface ); |
---|
| 304 | |
---|
| 305 | /* Open connection to network */ |
---|
| 306 | memset ( &hijack, 0, sizeof ( hijack ) ); |
---|
| 307 | if ( hijack_open ( interface, &hijack ) < 0 ) |
---|
| 308 | goto err; |
---|
| 309 | |
---|
| 310 | /* Do the forwarding */ |
---|
| 311 | max_fd = ( ( fd > hijack.fd ) ? fd : hijack.fd ); |
---|
| 312 | while ( 1 ) { |
---|
| 313 | /* Wait for available data */ |
---|
| 314 | FD_ZERO ( &fdset ); |
---|
| 315 | FD_SET ( fd, &fdset ); |
---|
| 316 | FD_SET ( hijack.fd, &fdset ); |
---|
| 317 | if ( select ( ( max_fd + 1 ), &fdset, NULL, NULL, 0 ) < 0 ) { |
---|
| 318 | logmsg ( LOG_ERR, "select failed: %s\n", |
---|
| 319 | strerror ( errno ) ); |
---|
| 320 | goto err; |
---|
| 321 | } |
---|
| 322 | if ( FD_ISSET ( fd, &fdset ) ) { |
---|
| 323 | len = forward_from_hijacker ( &hijack, fd ); |
---|
| 324 | if ( len < 0 ) |
---|
| 325 | goto err; |
---|
| 326 | if ( len == 0 ) |
---|
| 327 | break; |
---|
| 328 | } |
---|
| 329 | if ( FD_ISSET ( hijack.fd, &fdset ) ) { |
---|
| 330 | len = forward_to_hijacker ( fd, &hijack ); |
---|
| 331 | if ( len < 0 ) |
---|
| 332 | goto err; |
---|
| 333 | if ( len == 0 ) |
---|
| 334 | break; |
---|
| 335 | } |
---|
| 336 | } |
---|
| 337 | |
---|
| 338 | hijack_close ( &hijack ); |
---|
| 339 | logmsg ( LOG_INFO, "closed connection for %s\n", interface ); |
---|
| 340 | logmsg ( LOG_INFO, "received %ld packets, sent %ld packets\n", |
---|
| 341 | hijack.rx_count, hijack.tx_count ); |
---|
| 342 | |
---|
| 343 | return 0; |
---|
| 344 | |
---|
| 345 | err: |
---|
| 346 | if ( hijack.pcap ) |
---|
| 347 | hijack_close ( &hijack ); |
---|
| 348 | return -1; |
---|
| 349 | } |
---|
| 350 | |
---|
| 351 | /** |
---|
| 352 | * Open listener socket |
---|
| 353 | * |
---|
| 354 | */ |
---|
| 355 | static int open_listener ( const char *interface, |
---|
| 356 | struct hijack_listener *listener ) { |
---|
| 357 | |
---|
| 358 | /* Create socket */ |
---|
| 359 | listener->fd = socket ( PF_UNIX, SOCK_SEQPACKET, 0 ); |
---|
| 360 | if ( listener->fd < 0 ) { |
---|
| 361 | logmsg ( LOG_ERR, "Could not create socket: %s\n", |
---|
| 362 | strerror ( errno ) ); |
---|
| 363 | goto err; |
---|
| 364 | } |
---|
| 365 | |
---|
| 366 | /* Bind to local filename */ |
---|
| 367 | listener->sun.sun_family = AF_UNIX, |
---|
| 368 | snprintf ( listener->sun.sun_path, sizeof ( listener->sun.sun_path ), |
---|
| 369 | "/var/run/hijack-%s", interface ); |
---|
| 370 | if ( bind ( listener->fd, ( struct sockaddr * ) &listener->sun, |
---|
| 371 | sizeof ( listener->sun ) ) < 0 ) { |
---|
| 372 | logmsg ( LOG_ERR, "Could not bind socket to %s: %s\n", |
---|
| 373 | listener->sun.sun_path, strerror ( errno ) ); |
---|
| 374 | goto err; |
---|
| 375 | } |
---|
| 376 | |
---|
| 377 | /* Set as a listening socket */ |
---|
| 378 | if ( listen ( listener->fd, 0 ) < 0 ) { |
---|
| 379 | logmsg ( LOG_ERR, "Could not listen to %s: %s\n", |
---|
| 380 | listener->sun.sun_path, strerror ( errno ) ); |
---|
| 381 | goto err; |
---|
| 382 | } |
---|
| 383 | |
---|
| 384 | return 0; |
---|
| 385 | |
---|
| 386 | err: |
---|
| 387 | if ( listener->fd >= 0 ) |
---|
| 388 | close ( listener->fd ); |
---|
| 389 | return -1; |
---|
| 390 | } |
---|
| 391 | |
---|
| 392 | /** |
---|
| 393 | * Listen on listener socket |
---|
| 394 | * |
---|
| 395 | */ |
---|
| 396 | static int listen_for_hijackers ( struct hijack_listener *listener, |
---|
| 397 | const char *interface ) { |
---|
| 398 | int fd; |
---|
| 399 | pid_t child; |
---|
| 400 | int rc; |
---|
| 401 | |
---|
| 402 | logmsg ( LOG_INFO, "Listening on %s\n", listener->sun.sun_path ); |
---|
| 403 | |
---|
| 404 | while ( ! signalled ) { |
---|
| 405 | /* Accept new connection, interruptibly */ |
---|
| 406 | siginterrupt ( SIGINT, 1 ); |
---|
| 407 | siginterrupt ( SIGHUP, 1 ); |
---|
| 408 | fd = accept ( listener->fd, NULL, 0 ); |
---|
| 409 | siginterrupt ( SIGINT, 0 ); |
---|
| 410 | siginterrupt ( SIGHUP, 0 ); |
---|
| 411 | if ( fd < 0 ) { |
---|
| 412 | if ( errno == EINTR ) { |
---|
| 413 | continue; |
---|
| 414 | } else { |
---|
| 415 | logmsg ( LOG_ERR, "accept failed: %s\n", |
---|
| 416 | strerror ( errno ) ); |
---|
| 417 | goto err; |
---|
| 418 | } |
---|
| 419 | } |
---|
| 420 | |
---|
| 421 | /* Fork child process */ |
---|
| 422 | child = fork(); |
---|
| 423 | if ( child < 0 ) { |
---|
| 424 | logmsg ( LOG_ERR, "fork failed: %s\n", |
---|
| 425 | strerror ( errno ) ); |
---|
| 426 | goto err; |
---|
| 427 | } |
---|
| 428 | if ( child == 0 ) { |
---|
| 429 | /* I am the child; run the hijacker */ |
---|
| 430 | rc = run_hijacker ( interface, fd ); |
---|
| 431 | close ( fd ); |
---|
| 432 | exit ( rc ); |
---|
| 433 | } |
---|
| 434 | |
---|
| 435 | close ( fd ); |
---|
| 436 | } |
---|
| 437 | |
---|
| 438 | logmsg ( LOG_INFO, "Stopped listening on %s\n", |
---|
| 439 | listener->sun.sun_path ); |
---|
| 440 | return 0; |
---|
| 441 | |
---|
| 442 | err: |
---|
| 443 | if ( fd >= 0 ) |
---|
| 444 | close ( fd ); |
---|
| 445 | return -1; |
---|
| 446 | } |
---|
| 447 | |
---|
| 448 | /** |
---|
| 449 | * Close listener socket |
---|
| 450 | * |
---|
| 451 | */ |
---|
| 452 | static void close_listener ( struct hijack_listener *listener ) { |
---|
| 453 | close ( listener->fd ); |
---|
| 454 | unlink ( listener->sun.sun_path ); |
---|
| 455 | } |
---|
| 456 | |
---|
| 457 | /** |
---|
| 458 | * Print usage |
---|
| 459 | * |
---|
| 460 | */ |
---|
| 461 | static void usage ( char **argv ) { |
---|
| 462 | logmsg ( LOG_ERR, |
---|
| 463 | "Usage: %s [options]\n" |
---|
| 464 | "\n" |
---|
| 465 | "Options:\n" |
---|
| 466 | " -h|--help Print this help message\n" |
---|
| 467 | " -i|--interface intf Use specified network interface\n" |
---|
| 468 | " -n|--nodaemon Run in foreground\n", |
---|
| 469 | argv[0] ); |
---|
| 470 | } |
---|
| 471 | |
---|
| 472 | /** |
---|
| 473 | * Parse command-line options |
---|
| 474 | * |
---|
| 475 | */ |
---|
| 476 | static int parse_options ( int argc, char **argv, |
---|
| 477 | struct hijack_options *options ) { |
---|
| 478 | static struct option long_options[] = { |
---|
| 479 | { "interface", 1, NULL, 'i' }, |
---|
| 480 | { "nodaemon", 0, NULL, 'n' }, |
---|
| 481 | { "help", 0, NULL, 'h' }, |
---|
| 482 | { }, |
---|
| 483 | }; |
---|
| 484 | int c; |
---|
| 485 | |
---|
| 486 | /* Set default options */ |
---|
| 487 | memset ( options, 0, sizeof ( *options ) ); |
---|
| 488 | strncpy ( options->interface, "eth0", sizeof ( options->interface ) ); |
---|
| 489 | options->daemonise = 1; |
---|
| 490 | |
---|
| 491 | /* Parse command-line options */ |
---|
| 492 | while ( 1 ) { |
---|
| 493 | int option_index = 0; |
---|
| 494 | |
---|
| 495 | c = getopt_long ( argc, argv, "i:hn", long_options, |
---|
| 496 | &option_index ); |
---|
| 497 | if ( c < 0 ) |
---|
| 498 | break; |
---|
| 499 | |
---|
| 500 | switch ( c ) { |
---|
| 501 | case 'i': |
---|
| 502 | strncpy ( options->interface, optarg, |
---|
| 503 | sizeof ( options->interface ) ); |
---|
| 504 | break; |
---|
| 505 | case 'n': |
---|
| 506 | options->daemonise = 0; |
---|
| 507 | break; |
---|
| 508 | case 'h': |
---|
| 509 | usage( argv ); |
---|
| 510 | return -1; |
---|
| 511 | case '?': |
---|
| 512 | /* Unrecognised option */ |
---|
| 513 | return -1; |
---|
| 514 | default: |
---|
| 515 | logmsg ( LOG_ERR, "Unrecognised option '-%c'\n", c ); |
---|
| 516 | return -1; |
---|
| 517 | } |
---|
| 518 | } |
---|
| 519 | |
---|
| 520 | /* Check there's nothing left over on the command line */ |
---|
| 521 | if ( optind != argc ) { |
---|
| 522 | usage ( argv ); |
---|
| 523 | return -1; |
---|
| 524 | } |
---|
| 525 | |
---|
| 526 | return 0; |
---|
| 527 | } |
---|
| 528 | |
---|
| 529 | /** |
---|
| 530 | * Daemonise |
---|
| 531 | * |
---|
| 532 | */ |
---|
| 533 | static int daemonise ( const char *interface ) { |
---|
| 534 | char pidfile[16 + IF_NAMESIZE + 4]; /* "/var/run/hijack-<intf>.pid" */ |
---|
| 535 | char pid[16]; |
---|
| 536 | int pidlen; |
---|
| 537 | int fd = -1; |
---|
| 538 | |
---|
| 539 | /* Daemonise */ |
---|
| 540 | if ( daemon ( 0, 0 ) < 0 ) { |
---|
| 541 | logmsg ( LOG_ERR, "Could not daemonise: %s\n", |
---|
| 542 | strerror ( errno ) ); |
---|
| 543 | goto err; |
---|
| 544 | } |
---|
| 545 | daemonised = 1; /* Direct messages to syslog now */ |
---|
| 546 | |
---|
| 547 | /* Open pid file */ |
---|
| 548 | snprintf ( pidfile, sizeof ( pidfile ), "/var/run/hijack-%s.pid", |
---|
| 549 | interface ); |
---|
| 550 | fd = open ( pidfile, ( O_WRONLY | O_CREAT | O_TRUNC ), |
---|
| 551 | ( S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH ) ); |
---|
| 552 | if ( fd < 0 ) { |
---|
| 553 | logmsg ( LOG_ERR, "Could not open %s for writing: %s\n", |
---|
| 554 | pidfile, strerror ( errno ) ); |
---|
| 555 | goto err; |
---|
| 556 | } |
---|
| 557 | |
---|
| 558 | /* Write pid to file */ |
---|
| 559 | pidlen = snprintf ( pid, sizeof ( pid ), "%d\n", getpid() ); |
---|
| 560 | if ( write ( fd, pid, pidlen ) != pidlen ) { |
---|
| 561 | logmsg ( LOG_ERR, "Could not write %s: %s\n", |
---|
| 562 | pidfile, strerror ( errno ) ); |
---|
| 563 | goto err; |
---|
| 564 | } |
---|
| 565 | |
---|
| 566 | close ( fd ); |
---|
| 567 | return 0; |
---|
| 568 | |
---|
| 569 | err: |
---|
| 570 | if ( fd >= 0 ) |
---|
| 571 | close ( fd ); |
---|
| 572 | return -1; |
---|
| 573 | } |
---|
| 574 | |
---|
| 575 | int main ( int argc, char **argv ) { |
---|
| 576 | struct hijack_options options; |
---|
| 577 | struct hijack_listener listener; |
---|
| 578 | struct sigaction sa; |
---|
| 579 | |
---|
| 580 | /* Parse command-line options */ |
---|
| 581 | if ( parse_options ( argc, argv, &options ) < 0 ) |
---|
| 582 | exit ( 1 ); |
---|
| 583 | |
---|
| 584 | /* Set up syslog connection */ |
---|
| 585 | openlog ( basename ( argv[0] ), LOG_PID, LOG_DAEMON ); |
---|
| 586 | |
---|
| 587 | /* Set up listening socket */ |
---|
| 588 | if ( open_listener ( options.interface, &listener ) < 0 ) |
---|
| 589 | exit ( 1 ); |
---|
| 590 | |
---|
| 591 | /* Daemonise on demand */ |
---|
| 592 | if ( options.daemonise ) { |
---|
| 593 | if ( daemonise ( options.interface ) < 0 ) |
---|
| 594 | exit ( 1 ); |
---|
| 595 | } |
---|
| 596 | |
---|
| 597 | /* Avoid creating zombies */ |
---|
| 598 | memset ( &sa, 0, sizeof ( sa ) ); |
---|
| 599 | sa.sa_handler = SIG_IGN; |
---|
| 600 | sa.sa_flags = SA_RESTART | SA_NOCLDWAIT; |
---|
| 601 | if ( sigaction ( SIGCHLD, &sa, NULL ) < 0 ) { |
---|
| 602 | logmsg ( LOG_ERR, "Could not set SIGCHLD handler: %s", |
---|
| 603 | strerror ( errno ) ); |
---|
| 604 | exit ( 1 ); |
---|
| 605 | } |
---|
| 606 | |
---|
| 607 | /* Set 'signalled' flag on SIGINT or SIGHUP */ |
---|
| 608 | sa.sa_handler = flag_signalled; |
---|
| 609 | sa.sa_flags = SA_RESTART | SA_RESETHAND; |
---|
| 610 | if ( sigaction ( SIGINT, &sa, NULL ) < 0 ) { |
---|
| 611 | logmsg ( LOG_ERR, "Could not set SIGINT handler: %s", |
---|
| 612 | strerror ( errno ) ); |
---|
| 613 | exit ( 1 ); |
---|
| 614 | } |
---|
| 615 | if ( sigaction ( SIGHUP, &sa, NULL ) < 0 ) { |
---|
| 616 | logmsg ( LOG_ERR, "Could not set SIGHUP handler: %s", |
---|
| 617 | strerror ( errno ) ); |
---|
| 618 | exit ( 1 ); |
---|
| 619 | } |
---|
| 620 | |
---|
| 621 | /* Listen for hijackers */ |
---|
| 622 | if ( listen_for_hijackers ( &listener, options.interface ) < 0 ) |
---|
| 623 | exit ( 1 ); |
---|
| 624 | |
---|
| 625 | close_listener ( &listener ); |
---|
| 626 | |
---|
| 627 | return 0; |
---|
| 628 | } |
---|