2018-02-27 19:20:58 +00:00
|
|
|
/*-
|
2015-02-24 18:19:20 +00:00
|
|
|
* SSLsplit - transparent SSL/TLS interception
|
2018-02-27 19:20:58 +00:00
|
|
|
* https://www.roe.ch/SSLsplit
|
|
|
|
*
|
|
|
|
* Copyright (c) 2009-2018, Daniel Roethlisberger <daniel@roe.ch>.
|
2012-04-13 12:47:30 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
2018-02-27 19:20:58 +00:00
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
2012-04-13 12:47:30 +00:00
|
|
|
*
|
2018-02-27 19:20:58 +00:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS ``AS IS''
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
2012-04-13 12:47:30 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "log.h"
|
|
|
|
|
|
|
|
#include "logger.h"
|
|
|
|
#include "sys.h"
|
|
|
|
#include "attrib.h"
|
2014-11-24 21:01:52 +00:00
|
|
|
#include "privsep.h"
|
2014-11-25 22:45:40 +00:00
|
|
|
#include "defaults.h"
|
2018-11-03 15:23:31 +00:00
|
|
|
#include "logpkt.h"
|
2012-04-13 12:47:30 +00:00
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <syslog.h>
|
2014-10-18 22:40:22 +00:00
|
|
|
#include <assert.h>
|
2014-10-18 23:02:53 +00:00
|
|
|
#include <sys/stat.h>
|
2016-03-27 13:35:37 +00:00
|
|
|
#include <netinet/in.h>
|
2012-04-13 12:47:30 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Centralized logging code multiplexing thread access to the logger based
|
|
|
|
* logging in separate threads. Some log types are switchable to different
|
|
|
|
* backends, such as syslog and stderr.
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
2016-03-25 14:56:42 +00:00
|
|
|
/*
|
|
|
|
* Common code for all logs.
|
|
|
|
*/
|
|
|
|
static proxy_ctx_t *proxy_ctx = NULL;
|
|
|
|
|
2017-07-25 13:07:39 +00:00
|
|
|
void
|
2016-03-25 14:56:42 +00:00
|
|
|
log_exceptcb(void)
|
|
|
|
{
|
2018-11-29 23:49:37 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Error %d on logger: %s\n", errno, strerror(errno));
|
|
|
|
/* Do not break the event loop if out of fds:
|
|
|
|
* Bad file descriptor (9) or Message too long (40) */
|
|
|
|
if (errno == 9 || errno == 40) {
|
|
|
|
return;
|
|
|
|
}
|
2016-03-25 14:56:42 +00:00
|
|
|
if (proxy_ctx) {
|
|
|
|
proxy_loopbreak(proxy_ctx);
|
2017-07-25 13:07:39 +00:00
|
|
|
proxy_ctx = NULL;
|
2016-03-25 14:56:42 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
/*
|
|
|
|
* Error log.
|
|
|
|
* Switchable between stderr and syslog.
|
|
|
|
* Uses logger thread.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static logger_t *err_log = NULL;
|
2014-11-23 14:44:20 +00:00
|
|
|
static int err_shortcut_logger = 0;
|
2012-04-13 12:47:30 +00:00
|
|
|
static int err_mode = LOG_ERR_MODE_STDERR;
|
|
|
|
|
|
|
|
static ssize_t
|
2018-11-03 15:23:31 +00:00
|
|
|
log_err_writecb(int level, UNUSED void *fh, UNUSED unsigned long ctl,
|
|
|
|
const void *buf, size_t sz)
|
2012-04-13 12:47:30 +00:00
|
|
|
{
|
|
|
|
switch (err_mode) {
|
|
|
|
case LOG_ERR_MODE_STDERR:
|
|
|
|
return fwrite(buf, sz - 1, 1, stderr);
|
|
|
|
case LOG_ERR_MODE_SYSLOG:
|
2017-10-29 22:22:34 +00:00
|
|
|
syslog(LOG_DAEMON|level, "%s", (const char *)buf);
|
2014-12-13 22:52:17 +00:00
|
|
|
return sz;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
log_err_printf(const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
char *buf;
|
|
|
|
int rv;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
rv = vasprintf(&buf, fmt, ap);
|
|
|
|
va_end(ap);
|
2014-11-17 18:11:27 +00:00
|
|
|
if (rv < 0)
|
2012-04-13 12:47:30 +00:00
|
|
|
return -1;
|
2014-11-23 14:44:20 +00:00
|
|
|
if (err_shortcut_logger) {
|
2017-10-14 22:39:30 +00:00
|
|
|
return logger_write_freebuf(err_log, LOG_ERR, NULL, 0,
|
2014-11-21 15:10:37 +00:00
|
|
|
buf, strlen(buf) + 1);
|
2012-04-13 12:47:30 +00:00
|
|
|
} else {
|
2018-11-03 15:23:31 +00:00
|
|
|
log_err_writecb(LOG_ERR, NULL, 0, (unsigned char*)buf, strlen(buf) + 1);
|
2017-10-14 22:39:30 +00:00
|
|
|
free(buf);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
log_err_level_printf(int level, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
char *buf;
|
|
|
|
int rv;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
rv = vasprintf(&buf, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
if (rv < 0)
|
|
|
|
return -1;
|
|
|
|
if (err_shortcut_logger) {
|
|
|
|
return logger_write_freebuf(err_log, level, NULL, 0,
|
|
|
|
buf, strlen(buf) + 1);
|
|
|
|
} else {
|
2018-11-03 15:23:31 +00:00
|
|
|
log_err_writecb(level, NULL, 0, (unsigned char*)buf, strlen(buf) + 1);
|
2012-04-13 12:47:30 +00:00
|
|
|
free(buf);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
log_err_mode(int mode)
|
|
|
|
{
|
|
|
|
err_mode = mode;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Debug log. Redirects logging to error log.
|
|
|
|
* Switchable between error log or no logging.
|
|
|
|
* Uses the error log logger thread.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int dbg_mode = LOG_DBG_MODE_NONE;
|
|
|
|
|
|
|
|
int
|
|
|
|
log_dbg_write_free(void *buf, size_t sz)
|
|
|
|
{
|
|
|
|
if (dbg_mode == LOG_DBG_MODE_NONE)
|
|
|
|
return 0;
|
|
|
|
|
2014-11-23 14:44:20 +00:00
|
|
|
if (err_shortcut_logger) {
|
2017-10-14 22:39:30 +00:00
|
|
|
return logger_write_freebuf(err_log, LOG_DEBUG, NULL, 0, buf, sz);
|
2012-04-13 12:47:30 +00:00
|
|
|
} else {
|
2018-11-03 15:23:31 +00:00
|
|
|
log_err_writecb(LOG_DEBUG, NULL, 0, buf, sz);
|
2012-04-13 12:47:30 +00:00
|
|
|
free(buf);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
log_dbg_print_free(char *s)
|
|
|
|
{
|
|
|
|
return log_dbg_write_free(s, strlen(s) + 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
log_dbg_printf(const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
char *buf;
|
|
|
|
int rv;
|
|
|
|
|
|
|
|
if (dbg_mode == LOG_DBG_MODE_NONE)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
rv = vasprintf(&buf, fmt, ap);
|
|
|
|
va_end(ap);
|
2014-11-17 18:11:27 +00:00
|
|
|
if (rv < 0)
|
2012-04-13 12:47:30 +00:00
|
|
|
return -1;
|
|
|
|
return log_dbg_print_free(buf);
|
|
|
|
}
|
|
|
|
|
2017-06-15 16:07:37 +00:00
|
|
|
int
|
2017-10-14 22:39:30 +00:00
|
|
|
log_dbg_level_printf(int level, const char *fmt, ...)
|
2017-06-15 16:07:37 +00:00
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
char *buf;
|
|
|
|
int rv;
|
|
|
|
|
2017-10-14 22:39:30 +00:00
|
|
|
if (dbg_mode == LOG_DBG_MODE_NONE || dbg_mode < level)
|
2017-06-15 16:07:37 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
rv = vasprintf(&buf, fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
if (rv < 0)
|
|
|
|
return -1;
|
|
|
|
return log_dbg_print_free(buf);
|
|
|
|
}
|
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
void
|
|
|
|
log_dbg_mode(int mode)
|
|
|
|
{
|
|
|
|
dbg_mode = mode;
|
|
|
|
}
|
|
|
|
|
2018-02-27 19:20:58 +00:00
|
|
|
/*
|
|
|
|
* Master key log. Logs master keys in SSLKEYLOGFILE format.
|
|
|
|
* Uses a logger thread.
|
|
|
|
*/
|
|
|
|
|
|
|
|
logger_t *masterkey_log = NULL;
|
|
|
|
static int masterkey_fd = -1;
|
|
|
|
static char *masterkey_fn = NULL;
|
2018-11-03 15:23:31 +00:00
|
|
|
static int masterkey_clisock = -1;
|
2018-02-27 19:20:58 +00:00
|
|
|
|
|
|
|
static int
|
|
|
|
log_masterkey_preinit(const char *logfile)
|
|
|
|
{
|
|
|
|
masterkey_fd = open(logfile, O_WRONLY|O_APPEND|O_CREAT, DFLT_FILEMODE);
|
|
|
|
if (masterkey_fd == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to open '%s' for writing: %s (%i)\n",
|
|
|
|
logfile, strerror(errno), errno);
|
|
|
|
return -1;
|
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
masterkey_fn = strdup(logfile);
|
|
|
|
if (!masterkey_fn) {
|
2018-02-27 19:20:58 +00:00
|
|
|
close(masterkey_fd);
|
|
|
|
masterkey_fd = -1;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
log_masterkey_reopencb(void)
|
|
|
|
{
|
|
|
|
close(masterkey_fd);
|
2018-11-03 15:23:31 +00:00
|
|
|
masterkey_fd = privsep_client_openfile(masterkey_clisock,
|
|
|
|
masterkey_fn,
|
|
|
|
0);
|
2018-02-27 19:20:58 +00:00
|
|
|
if (masterkey_fd == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to open '%s' for writing: %s\n",
|
|
|
|
masterkey_fn, strerror(errno));
|
|
|
|
free(masterkey_fn);
|
|
|
|
masterkey_fn = NULL;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Do the actual write to the open master key log file descriptor.
|
|
|
|
*/
|
|
|
|
static ssize_t
|
2018-11-03 15:23:31 +00:00
|
|
|
log_masterkey_writecb(UNUSED int level, UNUSED void *fh, UNUSED unsigned long ctl,
|
|
|
|
const void *buf, size_t sz)
|
2018-02-27 19:20:58 +00:00
|
|
|
{
|
|
|
|
if (write(masterkey_fd, buf, sz) == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Warning: Failed to write to masterkey log:"
|
|
|
|
" %s\n", strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return sz;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
log_masterkey_fini(void)
|
|
|
|
{
|
|
|
|
close(masterkey_fd);
|
|
|
|
}
|
2012-04-13 12:47:30 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Connection log. Logs a one-liner to a file-based connection log.
|
|
|
|
* Uses a logger thread.
|
|
|
|
*/
|
|
|
|
|
|
|
|
logger_t *connect_log = NULL;
|
|
|
|
static int connect_fd = -1;
|
2014-11-25 22:45:40 +00:00
|
|
|
static char *connect_fn = NULL;
|
2018-11-03 15:23:31 +00:00
|
|
|
static int connect_clisock = -1;
|
2012-04-13 12:47:30 +00:00
|
|
|
|
|
|
|
static int
|
2014-11-25 22:45:40 +00:00
|
|
|
log_connect_preinit(const char *logfile)
|
2012-04-13 12:47:30 +00:00
|
|
|
{
|
2014-11-25 22:45:40 +00:00
|
|
|
connect_fd = open(logfile, O_WRONLY|O_APPEND|O_CREAT, DFLT_FILEMODE);
|
|
|
|
if (connect_fd == -1) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to open '%s' for writing: %s (%i)\n",
|
2014-11-25 22:45:40 +00:00
|
|
|
logfile, strerror(errno), errno);
|
|
|
|
return -1;
|
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
connect_fn = strdup(logfile);
|
|
|
|
if (!connect_fn) {
|
2014-11-25 22:45:40 +00:00
|
|
|
close(connect_fd);
|
|
|
|
connect_fd = -1;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
log_connect_reopencb(void)
|
|
|
|
{
|
|
|
|
close(connect_fd);
|
2018-11-03 15:23:31 +00:00
|
|
|
connect_fd = privsep_client_openfile(connect_clisock,
|
|
|
|
connect_fn,
|
|
|
|
0);
|
2012-04-13 12:47:30 +00:00
|
|
|
if (connect_fd == -1) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to open '%s' for writing: %s\n",
|
2014-11-25 22:45:40 +00:00
|
|
|
connect_fn, strerror(errno));
|
|
|
|
free(connect_fn);
|
|
|
|
connect_fn = NULL;
|
2012-04-13 12:47:30 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Do the actual write to the open connection log file descriptor.
|
|
|
|
* We prepend a timestamp here, which means that timestamps are slightly
|
|
|
|
* delayed from the time of actual logging. Since we only have second
|
|
|
|
* resolution that should not make any difference.
|
|
|
|
*/
|
|
|
|
static ssize_t
|
2018-11-03 15:23:31 +00:00
|
|
|
log_connect_writecb(UNUSED int level, UNUSED void *fh, UNUSED unsigned long ctl,
|
|
|
|
const void *buf, size_t sz)
|
2012-04-13 12:47:30 +00:00
|
|
|
{
|
|
|
|
char timebuf[32];
|
|
|
|
time_t epoch;
|
|
|
|
struct tm *utc;
|
|
|
|
size_t n;
|
|
|
|
|
|
|
|
time(&epoch);
|
|
|
|
utc = gmtime(&epoch);
|
|
|
|
n = strftime(timebuf, sizeof(timebuf), "%Y-%m-%d %H:%M:%S UTC ", utc);
|
|
|
|
if (n == 0) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Error from strftime(): buffer too small\n");
|
2012-04-13 12:47:30 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if ((write(connect_fd, timebuf, n) == -1) ||
|
|
|
|
(write(connect_fd, buf, sz) == -1)) {
|
2018-11-03 15:23:31 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to write to connect log: %s\n",
|
2012-04-13 12:47:30 +00:00
|
|
|
strerror(errno));
|
2014-12-13 22:52:17 +00:00
|
|
|
return -1;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
2014-12-13 22:52:17 +00:00
|
|
|
return sz;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2014-11-25 22:45:40 +00:00
|
|
|
log_connect_fini(void)
|
2012-04-13 12:47:30 +00:00
|
|
|
{
|
|
|
|
close(connect_fd);
|
|
|
|
}
|
|
|
|
|
2017-10-29 22:22:34 +00:00
|
|
|
static int
|
|
|
|
log_info(int facility, const char *buf)
|
2017-07-25 13:07:39 +00:00
|
|
|
{
|
2017-08-13 01:36:33 +00:00
|
|
|
size_t sz = strlen(buf) + 1;
|
|
|
|
switch (err_mode) {
|
|
|
|
case LOG_ERR_MODE_STDERR:
|
|
|
|
return fwrite(buf, sz - 1, 1, stderr);
|
|
|
|
case LOG_ERR_MODE_SYSLOG:
|
2017-10-29 22:22:34 +00:00
|
|
|
syslog(facility|LOG_INFO, "%s", (const char *)buf);
|
2017-08-13 01:36:33 +00:00
|
|
|
return sz;
|
2017-07-25 13:07:39 +00:00
|
|
|
}
|
2017-08-13 01:36:33 +00:00
|
|
|
return -1;
|
2017-07-25 13:07:39 +00:00
|
|
|
}
|
|
|
|
|
2017-10-29 22:22:34 +00:00
|
|
|
int
|
|
|
|
log_stats(const char *buf)
|
|
|
|
{
|
|
|
|
return log_info(LOG_LOCAL0, buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
log_conn(const char *buf)
|
|
|
|
{
|
|
|
|
return log_info(LOG_LOCAL1, buf);
|
|
|
|
}
|
2012-04-13 12:47:30 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Content log.
|
|
|
|
* Logs connection content to either a single file or a directory containing
|
|
|
|
* per-connection logs.
|
2014-11-21 15:10:37 +00:00
|
|
|
* Uses a logger thread; the actual logging happens in a separate thread.
|
|
|
|
* To ensure ordering of requests (open, write, ..., close), logging for a
|
|
|
|
* single connection must happen from a single thread.
|
|
|
|
* This is guaranteed by the current pxythr architecture.
|
2012-04-13 12:47:30 +00:00
|
|
|
*/
|
|
|
|
|
2014-11-21 16:42:10 +00:00
|
|
|
#define PREPFLAG_REQUEST 1
|
2017-07-25 13:07:39 +00:00
|
|
|
#define PREPFLAG_EOF 2
|
2014-11-21 15:10:37 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
typedef struct log_content_file_ctx {
|
2014-11-21 15:10:37 +00:00
|
|
|
union {
|
|
|
|
struct {
|
2014-11-21 16:42:10 +00:00
|
|
|
char *header_req;
|
|
|
|
char *header_resp;
|
2018-11-03 15:23:31 +00:00
|
|
|
} single;
|
2014-11-21 15:10:37 +00:00
|
|
|
struct {
|
2014-11-25 22:45:40 +00:00
|
|
|
int fd;
|
2014-11-21 15:10:37 +00:00
|
|
|
char *filename;
|
|
|
|
} dir;
|
|
|
|
struct {
|
2014-11-25 22:45:40 +00:00
|
|
|
int fd;
|
2014-11-21 15:10:37 +00:00
|
|
|
char *filename;
|
|
|
|
} spec;
|
|
|
|
} u;
|
2018-11-03 15:23:31 +00:00
|
|
|
} log_content_file_ctx_t;
|
2014-11-21 15:10:37 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
typedef struct log_content_pcap_ctx {
|
|
|
|
union {
|
|
|
|
struct {
|
|
|
|
int fd;
|
|
|
|
char *filename;
|
|
|
|
} dir;
|
|
|
|
struct {
|
|
|
|
int fd;
|
|
|
|
char *filename;
|
|
|
|
} spec;
|
|
|
|
} u;
|
|
|
|
logpkt_ctx_t state;
|
|
|
|
} log_content_pcap_ctx_t;
|
|
|
|
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
typedef struct log_content_mirror_ctx {
|
|
|
|
logpkt_ctx_t state;
|
|
|
|
} log_content_mirror_ctx_t;
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
|
|
|
|
|
|
|
static int content_file_clisock = -1;
|
|
|
|
static logger_t *content_file_log = NULL;
|
|
|
|
static int content_pcap_clisock = -1;
|
|
|
|
static logger_t *content_pcap_log = NULL;
|
|
|
|
static uint8_t content_pcap_src_ether[ETHER_ADDR_LEN] = {
|
|
|
|
0x02, 0x00, 0x00, 0x11, 0x11, 0x11};
|
|
|
|
static uint8_t content_pcap_dst_ether[ETHER_ADDR_LEN] = {
|
|
|
|
0x02, 0x00, 0x00, 0x22, 0x22, 0x22};
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
static logger_t *content_mirror_log = NULL;
|
|
|
|
static libnet_t *content_mirror_libnet = NULL;
|
|
|
|
static size_t content_mirror_mtu = 0;
|
|
|
|
static uint8_t content_mirror_src_ether[ETHER_ADDR_LEN];
|
|
|
|
static uint8_t content_mirror_dst_ether[ETHER_ADDR_LEN];
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
2012-04-13 12:47:30 +00:00
|
|
|
|
2014-11-24 21:01:52 +00:00
|
|
|
/*
|
|
|
|
* Split a pathname into static LHS (including final slashes) and dynamic RHS.
|
|
|
|
* Returns -1 on error, 0 on success.
|
|
|
|
* On success, fills in lhs and rhs with newly allocated buffers that must
|
|
|
|
* be freed by the caller.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
log_content_split_pathspec(const char *path, char **lhs, char **rhs)
|
2012-04-13 12:47:30 +00:00
|
|
|
{
|
2014-11-24 21:01:52 +00:00
|
|
|
const char *p, *q, *r;
|
|
|
|
|
|
|
|
p = strchr(path, '%');
|
|
|
|
/* at first % or EOS */
|
|
|
|
|
|
|
|
/* skip % if next char is % (and implicitly not \0) */
|
|
|
|
while (p && p[1] == '%') {
|
|
|
|
p = strchr(p + 2, '%');
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
2014-11-24 21:01:52 +00:00
|
|
|
/* at first % that is not %%, or at EOS */
|
2012-04-13 12:47:30 +00:00
|
|
|
|
2014-11-24 21:01:52 +00:00
|
|
|
if (!p || !p[1]) {
|
|
|
|
/* EOS: no % that is not %% in path */
|
|
|
|
p = path + strlen(path);
|
|
|
|
}
|
|
|
|
/* at first hot % or at '\0' */
|
|
|
|
|
|
|
|
/* find last / before % */
|
|
|
|
for (r = q = strchr(path, '/'); q && (q < p); q = strchr(q + 1, '/')) {
|
|
|
|
r = q;
|
|
|
|
}
|
|
|
|
if (!(p = r)) {
|
|
|
|
/* no / found, use dummy ./ as LHS */
|
|
|
|
*lhs = strdup("./");
|
|
|
|
if (!*lhs)
|
|
|
|
return -1;
|
|
|
|
*rhs = strdup(path);
|
|
|
|
if (!*rhs) {
|
|
|
|
free(*lhs);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* at last / terminating the static part of path */
|
|
|
|
|
|
|
|
p++; /* skip / */
|
|
|
|
*lhs = malloc(p - path + 1 /* for terminating null */);
|
|
|
|
if (!*lhs)
|
|
|
|
return -1;
|
|
|
|
memcpy(*lhs, path, p - path);
|
|
|
|
(*lhs)[p - path] = '\0';
|
|
|
|
*rhs = strdup(p);
|
|
|
|
if (!*rhs) {
|
|
|
|
free(*lhs);
|
|
|
|
return -1;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
2014-11-24 21:01:52 +00:00
|
|
|
|
|
|
|
return 0;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
|
2014-10-18 22:40:22 +00:00
|
|
|
/*
|
|
|
|
* Generate a log path based on the given log spec.
|
|
|
|
* Returns an allocated buffer which must be freed by caller, or NULL on error.
|
|
|
|
*/
|
2014-11-13 22:38:46 +00:00
|
|
|
#define PATH_BUF_INC 1024
|
2014-11-24 21:01:52 +00:00
|
|
|
static char * MALLOC NONNULL(1,2,3)
|
2015-03-15 16:10:25 +00:00
|
|
|
log_content_format_pathspec(const char *logspec,
|
|
|
|
char *srchost, char *srcport,
|
|
|
|
char *dsthost, char *dstport,
|
2014-11-13 22:38:46 +00:00
|
|
|
char *exec_path, char *user, char *group)
|
2014-10-18 22:40:22 +00:00
|
|
|
{
|
|
|
|
/* set up buffer to hold our generated file path */
|
2014-11-13 22:38:46 +00:00
|
|
|
size_t path_buflen = PATH_BUF_INC;
|
2014-10-18 22:40:22 +00:00
|
|
|
char *path_buf = malloc(path_buflen);
|
|
|
|
if (path_buf == NULL) {
|
2018-11-03 15:23:31 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to allocate path buffer\n");
|
2014-10-18 22:40:22 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2014-10-19 02:41:43 +00:00
|
|
|
/* initialize the buffer as an empty C string */
|
|
|
|
path_buf[0] = '\0';
|
|
|
|
|
2014-10-18 22:40:22 +00:00
|
|
|
/* iterate over format specifiers */
|
|
|
|
size_t path_len = 0;
|
|
|
|
for (const char *p = logspec; *p != '\0'; p++) {
|
|
|
|
const char *elem = NULL;
|
|
|
|
size_t elem_len = 0;
|
|
|
|
|
|
|
|
const char iso8601[] = "%Y%m%dT%H%M%SZ";
|
2014-11-13 22:38:46 +00:00
|
|
|
char timebuf[24]; /* sized for ISO 8601 format */
|
2015-03-15 16:10:25 +00:00
|
|
|
char addrbuf[INET6_ADDRSTRLEN + 8]; /* [host]:port */
|
2014-10-18 22:40:22 +00:00
|
|
|
|
|
|
|
/* parse the format string and generate the next path element */
|
|
|
|
switch (*p) {
|
2014-11-13 22:38:46 +00:00
|
|
|
case '%':
|
|
|
|
p++;
|
|
|
|
/* handle format specifiers. */
|
|
|
|
switch (*p) {
|
|
|
|
case '\0':
|
|
|
|
/* unexpected eof; backtrack and discard
|
|
|
|
* invalid format spec */
|
|
|
|
p--;
|
|
|
|
elem_len = 0;
|
|
|
|
break;
|
2014-10-18 22:40:22 +00:00
|
|
|
case '%':
|
2014-11-13 22:38:46 +00:00
|
|
|
elem = p;
|
|
|
|
elem_len = 1;
|
|
|
|
break;
|
|
|
|
case 'd':
|
2015-03-15 16:10:25 +00:00
|
|
|
if (snprintf(addrbuf, sizeof(addrbuf),
|
|
|
|
"%s,%s", dsthost, dstport) < 0) {
|
|
|
|
addrbuf[0] = '?';
|
|
|
|
addrbuf[1] = '\0';
|
|
|
|
}
|
|
|
|
elem = addrbuf;
|
|
|
|
elem_len = strlen(addrbuf);
|
2014-11-13 22:38:46 +00:00
|
|
|
break;
|
2015-03-15 17:39:36 +00:00
|
|
|
case 'D':
|
|
|
|
elem = dsthost;
|
|
|
|
elem_len = strlen(dsthost);
|
|
|
|
break;
|
|
|
|
case 'p':
|
|
|
|
elem = dstport;
|
|
|
|
elem_len = strlen(dstport);
|
|
|
|
break;
|
2014-11-13 22:38:46 +00:00
|
|
|
case 's':
|
2015-03-15 16:10:25 +00:00
|
|
|
if (snprintf(addrbuf, sizeof(addrbuf),
|
|
|
|
"%s,%s", srchost, srcport) < 0) {
|
|
|
|
addrbuf[0] = '?';
|
|
|
|
addrbuf[1] = '\0';
|
|
|
|
}
|
|
|
|
elem = addrbuf;
|
|
|
|
elem_len = strlen(addrbuf);
|
2014-11-13 22:38:46 +00:00
|
|
|
break;
|
2015-03-15 17:39:36 +00:00
|
|
|
case 'S':
|
2015-03-15 17:28:10 +00:00
|
|
|
elem = srchost;
|
|
|
|
elem_len = strlen(srchost);
|
2015-02-09 01:20:02 +00:00
|
|
|
break;
|
2015-03-15 17:39:36 +00:00
|
|
|
case 'q':
|
2015-03-15 17:28:10 +00:00
|
|
|
elem = srcport;
|
|
|
|
elem_len = strlen(srcport);
|
2014-11-13 22:38:46 +00:00
|
|
|
break;
|
|
|
|
case 'x':
|
|
|
|
if (exec_path) {
|
|
|
|
char *match = exec_path;
|
|
|
|
while ((match = strchr(match, '/')) != NULL) {
|
|
|
|
match++;
|
|
|
|
elem = match;
|
2014-10-18 22:40:22 +00:00
|
|
|
}
|
2014-11-14 00:06:51 +00:00
|
|
|
elem_len = elem ? strlen(elem) : 0;
|
2014-11-13 22:38:46 +00:00
|
|
|
} else {
|
|
|
|
elem_len = 0;
|
2014-10-18 22:40:22 +00:00
|
|
|
}
|
|
|
|
break;
|
2014-11-13 22:38:46 +00:00
|
|
|
case 'X':
|
|
|
|
elem = exec_path;
|
|
|
|
elem_len = exec_path ? strlen(exec_path) : 0;
|
|
|
|
break;
|
|
|
|
case 'u':
|
|
|
|
elem = user;
|
|
|
|
elem_len = user ? strlen(user) : 0;
|
2014-10-18 22:40:22 +00:00
|
|
|
break;
|
2014-11-13 22:38:46 +00:00
|
|
|
case 'g':
|
|
|
|
elem = group;
|
|
|
|
elem_len = group ? strlen(group) : 0;
|
|
|
|
break;
|
|
|
|
case 'T': {
|
|
|
|
time_t epoch;
|
|
|
|
struct tm *utc;
|
|
|
|
|
|
|
|
time(&epoch);
|
|
|
|
utc = gmtime(&epoch);
|
|
|
|
strftime(timebuf, sizeof(timebuf), iso8601, utc);
|
|
|
|
|
|
|
|
elem = timebuf;
|
|
|
|
elem_len = sizeof(timebuf);
|
|
|
|
break;
|
|
|
|
}}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
elem = p;
|
|
|
|
elem_len = 1;
|
|
|
|
break;
|
2014-10-18 22:40:22 +00:00
|
|
|
}
|
|
|
|
|
2014-11-14 00:10:47 +00:00
|
|
|
if (elem_len > 0) {
|
|
|
|
/* growing the buffer to fit elem_len + terminating \0 */
|
|
|
|
if (path_buflen - path_len < elem_len + 1) {
|
|
|
|
/* Grow in PATH_BUF_INC chunks.
|
|
|
|
* Note that the use of `PATH_BUF_INC' provides
|
|
|
|
* our guaranteed space for a trailing '\0' */
|
|
|
|
path_buflen += elem_len + PATH_BUF_INC;
|
|
|
|
char *newbuf = realloc(path_buf, path_buflen);
|
|
|
|
if (newbuf == NULL) {
|
2018-11-03 15:23:31 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to reallocate"
|
2014-11-14 00:10:47 +00:00
|
|
|
" path buffer\n");
|
|
|
|
free(path_buf);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
path_buf = newbuf;
|
2014-10-18 22:40:22 +00:00
|
|
|
}
|
|
|
|
|
2014-11-14 00:10:47 +00:00
|
|
|
strncat(path_buf, elem, elem_len);
|
|
|
|
path_len += elem_len;
|
|
|
|
}
|
2014-10-18 22:40:22 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* apply terminating NUL */
|
|
|
|
assert(path_buflen > path_len);
|
|
|
|
path_buf[path_len] = '\0';
|
|
|
|
return path_buf;
|
|
|
|
}
|
2014-11-13 22:38:46 +00:00
|
|
|
#undef PATH_BUF_INC
|
2014-10-18 22:40:22 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
/*
|
|
|
|
* log_content_ctx_t is preallocated by the caller (part of connection ctx).
|
|
|
|
*/
|
2014-11-16 21:31:54 +00:00
|
|
|
int
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_open(log_content_ctx_t *ctx, opts_t *opts,
|
|
|
|
const struct sockaddr *srcaddr, socklen_t srcaddrlen,
|
|
|
|
const struct sockaddr *dstaddr, socklen_t dstaddrlen,
|
2015-03-15 16:10:25 +00:00
|
|
|
char *srchost, char *srcport,
|
|
|
|
char *dsthost, char *dstport,
|
2014-11-14 14:31:30 +00:00
|
|
|
char *exec_path, char *user, char *group)
|
2012-04-13 12:47:30 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
char timebuf[24];
|
|
|
|
time_t epoch;
|
|
|
|
struct tm *utc;
|
|
|
|
char *dsthost_clean = NULL;
|
|
|
|
char *srchost_clean = NULL;
|
|
|
|
|
|
|
|
if (ctx->file || ctx->pcap
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
|| ctx->mirror
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
|
|
|
)
|
|
|
|
return 0; /* does this actually happen? */
|
|
|
|
|
|
|
|
if (opts->contentlog_isdir || opts->contentlog_isspec ||
|
|
|
|
opts->pcaplog_isdir || opts->pcaplog_isspec) {
|
|
|
|
if (opts->contentlog_isdir || opts->pcaplog_isdir) {
|
|
|
|
if (time(&epoch) == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to get time\n");
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
if ((utc = gmtime(&epoch)) == NULL) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to convert time:"
|
|
|
|
" %s (%i)\n",
|
|
|
|
strerror(errno), errno);
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
if (!strftime(timebuf, sizeof(timebuf),
|
|
|
|
"%Y%m%dT%H%M%SZ", utc)) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to format time:"
|
|
|
|
" %s (%i)\n",
|
|
|
|
strerror(errno), errno);
|
|
|
|
goto errout;
|
|
|
|
}
|
2014-11-16 21:31:54 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
|
2015-03-15 16:52:04 +00:00
|
|
|
srchost_clean = sys_ip46str_sanitize(srchost);
|
|
|
|
if (!srchost_clean) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to sanitize srchost\n");
|
2015-03-15 16:52:04 +00:00
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
dsthost_clean = sys_ip46str_sanitize(dsthost);
|
|
|
|
if (!dsthost_clean) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to sanitize dsthost\n");
|
2015-03-15 16:52:04 +00:00
|
|
|
free(srchost_clean);
|
|
|
|
goto errout;
|
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (opts->contentlog) {
|
|
|
|
ctx->file = malloc(sizeof(log_content_file_ctx_t));
|
|
|
|
if (!ctx->file)
|
2014-11-21 15:10:37 +00:00
|
|
|
goto errout;
|
2018-11-03 15:23:31 +00:00
|
|
|
memset(ctx->file, 0, sizeof(log_content_file_ctx_t));
|
|
|
|
|
|
|
|
if (opts->contentlog_isdir) {
|
|
|
|
/* per-connection-file content log (-S) */
|
|
|
|
if (asprintf(&ctx->file->u.dir.filename,
|
|
|
|
"%s/%s-%s,%s-%s,%s.log",
|
|
|
|
opts->contentlog, timebuf,
|
|
|
|
srchost_clean, srcport,
|
|
|
|
dsthost_clean, dstport) < 0) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to format filename:"
|
|
|
|
" %s (%i)\n",
|
|
|
|
strerror(errno), errno);
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
} else if (opts->contentlog_isspec) {
|
|
|
|
/* per-connection-file content log with logspec (-F) */
|
|
|
|
ctx->file->u.spec.filename =
|
|
|
|
log_content_format_pathspec(opts->contentlog,
|
|
|
|
srchost_clean,
|
|
|
|
srcport,
|
|
|
|
dsthost_clean,
|
|
|
|
dstport,
|
|
|
|
exec_path,
|
|
|
|
user, group);
|
|
|
|
if (!ctx->file->u.spec.filename) {
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* single-file content log (-L) */
|
|
|
|
if (asprintf(&ctx->file->u.single.header_req,
|
|
|
|
"[%s]:%s -> [%s]:%s",
|
|
|
|
srchost, srcport, dsthost, dstport) < 0) {
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
if (asprintf(&ctx->file->u.single.header_resp,
|
|
|
|
"[%s]:%s -> [%s]:%s",
|
|
|
|
dsthost, dstport, srchost, srcport) < 0) {
|
|
|
|
free(ctx->file->u.single.header_req);
|
|
|
|
goto errout;
|
|
|
|
}
|
2014-11-16 21:31:54 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (opts->pcaplog) {
|
|
|
|
ctx->pcap = malloc(sizeof(log_content_pcap_ctx_t));
|
|
|
|
if (!ctx->pcap)
|
2015-03-15 16:52:04 +00:00
|
|
|
goto errout;
|
2018-11-03 15:23:31 +00:00
|
|
|
memset(ctx->pcap, 0, sizeof(log_content_pcap_ctx_t));
|
|
|
|
|
|
|
|
logpkt_ctx_init(&ctx->pcap->state, NULL, 0,
|
|
|
|
content_pcap_src_ether, content_pcap_dst_ether,
|
|
|
|
srcaddr, srcaddrlen, dstaddr, dstaddrlen);
|
|
|
|
|
|
|
|
if (opts->pcaplog_isdir) {
|
|
|
|
/* per-connection-file pcap log (-Y) */
|
|
|
|
if (asprintf(&ctx->pcap->u.dir.filename,
|
|
|
|
"%s/%s-%s,%s-%s,%s.pcap",
|
|
|
|
opts->pcaplog, timebuf,
|
|
|
|
srchost_clean, srcport,
|
|
|
|
dsthost_clean, dstport) < 0) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to format filename:"
|
|
|
|
" %s (%i)\n",
|
|
|
|
strerror(errno), errno);
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
} else if (opts->pcaplog_isspec) {
|
|
|
|
/* per-connection-file pcap log with logspec (-y) */
|
|
|
|
ctx->pcap->u.spec.filename =
|
|
|
|
log_content_format_pathspec(opts->pcaplog,
|
|
|
|
srchost_clean,
|
|
|
|
srcport,
|
|
|
|
dsthost_clean,
|
|
|
|
dstport,
|
|
|
|
exec_path,
|
|
|
|
user, group);
|
|
|
|
if (!ctx->pcap->u.spec.filename) {
|
|
|
|
goto errout;
|
|
|
|
}
|
2015-03-15 16:52:04 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (opts->mirrorif) {
|
|
|
|
ctx->mirror = malloc(sizeof(log_content_mirror_ctx_t));
|
|
|
|
if (!ctx->mirror)
|
2015-03-15 16:52:04 +00:00
|
|
|
goto errout;
|
2018-11-03 15:23:31 +00:00
|
|
|
memset(ctx->mirror, 0, sizeof(log_content_mirror_ctx_t));
|
|
|
|
|
|
|
|
logpkt_ctx_init(&ctx->mirror->state,
|
|
|
|
content_mirror_libnet,
|
|
|
|
content_mirror_mtu,
|
|
|
|
content_mirror_src_ether,
|
|
|
|
content_mirror_dst_ether,
|
|
|
|
srcaddr, srcaddrlen, dstaddr, dstaddrlen);
|
|
|
|
}
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
|
|
|
|
|
|
|
/* submit open events */
|
|
|
|
if (ctx->file) {
|
|
|
|
if (logger_open(content_file_log, ctx->file) == -1)
|
2014-11-21 15:10:37 +00:00
|
|
|
goto errout;
|
2018-11-03 15:23:31 +00:00
|
|
|
}
|
|
|
|
if (ctx->pcap) {
|
|
|
|
if (logger_open(content_pcap_log, ctx->pcap) == -1)
|
2014-11-21 15:10:37 +00:00
|
|
|
goto errout;
|
2018-11-03 15:23:31 +00:00
|
|
|
}
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (ctx->mirror) {
|
|
|
|
if (logger_open(content_mirror_log, ctx->mirror) == -1)
|
2014-11-21 15:10:37 +00:00
|
|
|
goto errout;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
#endif /* !WITHOUT_MIRROR */
|
2014-11-21 15:10:37 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
if (srchost_clean)
|
|
|
|
free(srchost_clean);
|
|
|
|
if (dsthost_clean)
|
|
|
|
free(dsthost_clean);
|
2014-11-16 21:31:54 +00:00
|
|
|
return 0;
|
2018-11-03 15:23:31 +00:00
|
|
|
|
2014-11-21 15:10:37 +00:00
|
|
|
errout:
|
2018-11-03 15:23:31 +00:00
|
|
|
if (srchost_clean)
|
|
|
|
free(srchost_clean);
|
|
|
|
if (dsthost_clean)
|
|
|
|
free(dsthost_clean);
|
|
|
|
if (ctx->file)
|
|
|
|
free(ctx->file);
|
|
|
|
if (ctx->pcap) {
|
|
|
|
free(ctx->pcap);
|
|
|
|
}
|
|
|
|
if (ctx->mirror) {
|
|
|
|
free(ctx->mirror);
|
|
|
|
}
|
|
|
|
memset(ctx, 0, sizeof(log_content_ctx_t));
|
2014-11-21 15:10:37 +00:00
|
|
|
return -1;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
/*
|
|
|
|
* On failure, lb is not freed.
|
|
|
|
*/
|
2014-11-21 16:42:10 +00:00
|
|
|
int
|
|
|
|
log_content_submit(log_content_ctx_t *ctx, logbuf_t *lb, int is_request)
|
2012-04-13 12:47:30 +00:00
|
|
|
{
|
2014-11-21 15:10:37 +00:00
|
|
|
unsigned long prepflags = 0;
|
2018-11-03 15:23:31 +00:00
|
|
|
logbuf_t *lbpcap, *lbmirror;
|
2012-04-13 12:47:30 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
if (is_request)
|
|
|
|
prepflags |= PREPFLAG_REQUEST;
|
|
|
|
|
|
|
|
lb = logbuf_make_contiguous(lb);
|
|
|
|
if (!lb)
|
2014-11-21 16:42:10 +00:00
|
|
|
return -1;
|
2018-11-03 15:23:31 +00:00
|
|
|
|
|
|
|
lbpcap = lbmirror = lb;
|
|
|
|
if (content_file_log) {
|
|
|
|
if (content_pcap_log) {
|
|
|
|
lbpcap = logbuf_new_deepcopy(lb, 1);
|
|
|
|
if (!lbpcap)
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (content_mirror_log) {
|
|
|
|
lbmirror = logbuf_new_deepcopy(lb, 1);
|
|
|
|
if (!lbmirror)
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
} else if (content_pcap_log && content_mirror_log) {
|
|
|
|
lbmirror = logbuf_new_deepcopy(lb, 1);
|
|
|
|
if (!lbmirror)
|
|
|
|
goto errout;
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
if (content_pcap_log) {
|
|
|
|
if (logger_submit(content_pcap_log, ctx->pcap,
|
|
|
|
prepflags, lbpcap) == -1) {
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
lbpcap = NULL;
|
|
|
|
}
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (content_mirror_log) {
|
|
|
|
if (logger_submit(content_mirror_log, ctx->mirror,
|
|
|
|
prepflags, lbmirror) == -1) {
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
lbmirror = NULL;
|
|
|
|
}
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
|
|
|
if (content_file_log) {
|
|
|
|
if (logger_submit(content_file_log, ctx->file,
|
|
|
|
prepflags, lb) == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
errout:
|
|
|
|
if (lbpcap && lbpcap != lb)
|
|
|
|
logbuf_free(lbpcap);
|
|
|
|
if (lbmirror && lbmirror != lb)
|
|
|
|
logbuf_free(lbmirror);
|
|
|
|
return -1;
|
2014-11-21 15:10:37 +00:00
|
|
|
}
|
|
|
|
|
2014-11-21 16:42:10 +00:00
|
|
|
int
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_close(log_content_ctx_t *ctx, int by_requestor)
|
2014-11-21 15:10:37 +00:00
|
|
|
{
|
2017-07-25 13:07:39 +00:00
|
|
|
unsigned long prepflags = PREPFLAG_EOF;
|
2018-11-03 15:23:31 +00:00
|
|
|
unsigned long ctl;
|
2014-11-21 16:42:10 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
if (by_requestor) {
|
2017-07-25 13:07:39 +00:00
|
|
|
prepflags |= PREPFLAG_REQUEST;
|
2018-11-03 15:23:31 +00:00
|
|
|
ctl = LBFLAG_IS_REQ;
|
|
|
|
} else {
|
|
|
|
ctl = LBFLAG_IS_RESP;
|
2017-07-25 13:07:39 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
|
|
|
|
/* We call submit an empty log buffer in order to give the content log
|
|
|
|
* a chance to insert an EOF footer to be logged before actually
|
|
|
|
* closing the file. The logger_close() call will actually close the
|
|
|
|
* log. Some logs prefer to use the close callback for logging the
|
|
|
|
* close event to the log. */
|
|
|
|
if (content_file_log && ctx->file) {
|
|
|
|
if (logger_submit(content_file_log, ctx->file,
|
|
|
|
prepflags, NULL) == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (logger_close(content_file_log, ctx->file, ctl) == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
ctx->file = NULL;
|
2014-11-21 16:42:10 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
if (content_pcap_log && ctx->pcap) {
|
|
|
|
if (logger_submit(content_pcap_log, ctx->pcap,
|
|
|
|
prepflags, NULL) == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (logger_close(content_pcap_log, ctx->pcap, ctl) == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
ctx->pcap = NULL;
|
|
|
|
}
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (content_mirror_log && ctx->mirror) {
|
|
|
|
if (logger_submit(content_mirror_log, ctx->mirror,
|
|
|
|
prepflags, NULL) == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (logger_close(content_mirror_log, ctx->mirror, ctl) == -1) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
ctx->mirror = NULL;
|
|
|
|
}
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
|
|
|
return 0;
|
2014-11-21 15:10:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2014-11-25 22:45:40 +00:00
|
|
|
* Log-type specific code.
|
|
|
|
*
|
|
|
|
* The init/fini functions are executed globally in the main thread.
|
|
|
|
* Callback functions are executed in the logger thread.
|
2014-11-21 15:10:37 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
static int
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_dir_opencb(void *fh)
|
2014-11-21 15:10:37 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_ctx_t *ctx = fh;
|
2014-11-21 15:10:37 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
if ((ctx->u.dir.fd = privsep_client_openfile(content_file_clisock,
|
2014-11-25 22:45:40 +00:00
|
|
|
ctx->u.dir.filename,
|
|
|
|
0)) == -1) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Opening logdir file '%s' failed: %s (%i)\n",
|
2018-11-03 15:23:31 +00:00
|
|
|
ctx->u.dir.filename,
|
|
|
|
strerror(errno), errno);
|
2014-11-21 15:10:37 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_dir_closecb(void *fh, UNUSED unsigned long ctl)
|
2014-11-21 15:10:37 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_ctx_t *ctx = fh;
|
2014-11-21 15:10:37 +00:00
|
|
|
|
|
|
|
if (ctx->u.dir.filename)
|
|
|
|
free(ctx->u.dir.filename);
|
2014-11-25 22:45:40 +00:00
|
|
|
if (ctx->u.dir.fd != 1)
|
|
|
|
close(ctx->u.dir.fd);
|
2014-11-21 15:10:37 +00:00
|
|
|
free(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_dir_writecb(UNUSED int level, void *fh, UNUSED unsigned long ctl,
|
|
|
|
const void *buf, size_t sz)
|
2014-11-21 15:10:37 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_ctx_t *ctx = fh;
|
2014-11-21 15:10:37 +00:00
|
|
|
|
2014-11-25 22:45:40 +00:00
|
|
|
if (write(ctx->u.dir.fd, buf, sz) == -1) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to write to content log: %s\n",
|
2014-11-21 15:10:37 +00:00
|
|
|
strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
2014-12-13 22:52:17 +00:00
|
|
|
return sz;
|
2014-11-21 15:10:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_spec_opencb(void *fh)
|
2014-11-21 15:10:37 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_ctx_t *ctx = fh;
|
2014-11-21 15:10:37 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
if ((ctx->u.spec.fd = privsep_client_openfile(content_file_clisock,
|
2014-11-25 22:45:40 +00:00
|
|
|
ctx->u.spec.filename,
|
|
|
|
1)) == -1) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Opening logspec file '%s' failed: %s (%i)\n",
|
2014-11-24 21:01:52 +00:00
|
|
|
ctx->u.spec.filename, strerror(errno), errno);
|
2014-11-21 15:10:37 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_spec_closecb(void *fh, UNUSED unsigned long ctl)
|
2014-11-21 15:10:37 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_ctx_t *ctx = fh;
|
2014-11-21 15:10:37 +00:00
|
|
|
|
|
|
|
if (ctx->u.spec.filename)
|
|
|
|
free(ctx->u.spec.filename);
|
2014-11-25 22:45:40 +00:00
|
|
|
if (ctx->u.spec.fd != -1)
|
|
|
|
close(ctx->u.spec.fd);
|
2014-11-21 15:10:37 +00:00
|
|
|
free(ctx);
|
|
|
|
}
|
|
|
|
|
2014-11-25 22:45:40 +00:00
|
|
|
static ssize_t
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_spec_writecb(UNUSED int level, void *fh, UNUSED unsigned long ctl,
|
|
|
|
const void *buf, size_t sz)
|
2014-11-21 15:10:37 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_ctx_t *ctx = fh;
|
2014-11-21 15:10:37 +00:00
|
|
|
|
2014-11-25 22:45:40 +00:00
|
|
|
if (write(ctx->u.spec.fd, buf, sz) == -1) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to write to content log: %s\n",
|
2014-11-25 22:45:40 +00:00
|
|
|
strerror(errno));
|
2014-11-21 15:10:37 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2014-12-13 22:52:17 +00:00
|
|
|
return sz;
|
2014-11-25 22:45:40 +00:00
|
|
|
}
|
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
static int content_file_single_fd = -1;
|
|
|
|
static char *content_file_single_fn = NULL;
|
2014-11-25 22:45:40 +00:00
|
|
|
|
|
|
|
static int
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_single_preinit(const char *logfile)
|
2014-11-25 22:45:40 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
content_file_single_fd = open(logfile, O_WRONLY|O_APPEND|O_CREAT,
|
2014-11-25 22:45:40 +00:00
|
|
|
DFLT_FILEMODE);
|
2018-11-03 15:23:31 +00:00
|
|
|
if (content_file_single_fd == -1) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to open '%s' for writing: %s (%i)\n",
|
2014-11-25 22:45:40 +00:00
|
|
|
logfile, strerror(errno), errno);
|
2014-11-21 15:10:37 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
content_file_single_fn = strdup(logfile);
|
|
|
|
if (!content_file_single_fn) {
|
|
|
|
close(content_file_single_fd);
|
|
|
|
content_file_single_fd = -1;
|
2014-11-21 15:10:37 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_single_fini(void)
|
2014-11-21 15:10:37 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
if (content_file_single_fn) {
|
|
|
|
free(content_file_single_fn);
|
|
|
|
content_file_single_fn = NULL;
|
2014-11-25 22:45:40 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
if (content_file_single_fd != -1) {
|
|
|
|
close(content_file_single_fd);
|
|
|
|
content_file_single_fd = -1;
|
2014-11-25 22:45:40 +00:00
|
|
|
}
|
|
|
|
}
|
2014-11-21 15:10:37 +00:00
|
|
|
|
2014-11-25 22:45:40 +00:00
|
|
|
static int
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_single_reopencb(void)
|
2014-11-25 22:45:40 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
close(content_file_single_fd);
|
|
|
|
content_file_single_fd = privsep_client_openfile(content_file_clisock,
|
|
|
|
content_file_single_fn,
|
|
|
|
0);
|
|
|
|
if (content_file_single_fd == -1) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to open '%s' for writing: %s (%i)\n",
|
2018-11-03 15:23:31 +00:00
|
|
|
content_file_single_fn, strerror(errno), errno);
|
2014-11-25 22:45:40 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
2014-11-21 15:10:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_single_closecb(void *fh, UNUSED unsigned long ctl)
|
2014-11-21 15:10:37 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_ctx_t *ctx = fh;
|
2014-11-21 15:10:37 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
if (ctx->u.single.header_req) {
|
|
|
|
free(ctx->u.single.header_req);
|
2014-11-21 15:10:37 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
if (ctx->u.single.header_resp) {
|
|
|
|
free(ctx->u.single.header_resp);
|
2014-11-21 15:10:37 +00:00
|
|
|
}
|
|
|
|
free(ctx);
|
|
|
|
}
|
|
|
|
|
2014-11-25 22:45:40 +00:00
|
|
|
static ssize_t
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_single_writecb(UNUSED int level, void *fh, UNUSED unsigned long ctl,
|
|
|
|
const void *buf, size_t sz)
|
2014-11-25 22:45:40 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
UNUSED log_content_file_ctx_t *ctx = fh;
|
2014-11-25 22:45:40 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
if (write(content_file_single_fd, buf, sz) == -1) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to write to content log: %s\n",
|
2014-11-25 22:45:40 +00:00
|
|
|
strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
2014-12-13 22:52:17 +00:00
|
|
|
return sz;
|
2014-11-25 22:45:40 +00:00
|
|
|
}
|
|
|
|
|
2014-11-21 15:10:37 +00:00
|
|
|
static logbuf_t *
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_single_prepcb(void *fh, unsigned long prepflags,
|
|
|
|
logbuf_t *lb)
|
2014-11-21 15:10:37 +00:00
|
|
|
{
|
2018-11-03 15:23:31 +00:00
|
|
|
log_content_file_ctx_t *ctx = fh;
|
2014-11-21 16:42:10 +00:00
|
|
|
int is_request = !!(prepflags & PREPFLAG_REQUEST);
|
2014-11-21 15:10:37 +00:00
|
|
|
logbuf_t *head;
|
|
|
|
time_t epoch;
|
|
|
|
struct tm *utc;
|
|
|
|
char *header;
|
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
if (!(header = is_request ? ctx->u.single.header_req
|
|
|
|
: ctx->u.single.header_resp))
|
2012-04-13 12:47:30 +00:00
|
|
|
goto out;
|
|
|
|
|
2017-07-25 13:07:39 +00:00
|
|
|
/* prepend size tag or EOF, and newline */
|
|
|
|
if (prepflags & PREPFLAG_EOF) {
|
2018-11-03 15:23:31 +00:00
|
|
|
head = logbuf_new_printf(NULL, " (EOF)\n");
|
2017-07-25 13:07:39 +00:00
|
|
|
} else {
|
2018-11-03 15:23:31 +00:00
|
|
|
head = logbuf_new_printf(lb, " (%zu):\n", logbuf_size(lb));
|
2017-07-25 13:07:39 +00:00
|
|
|
}
|
2012-04-13 12:47:30 +00:00
|
|
|
if (!head) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to allocate memory\n");
|
2012-04-13 12:47:30 +00:00
|
|
|
logbuf_free(lb);
|
2014-11-21 15:10:37 +00:00
|
|
|
return NULL;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
lb = head;
|
|
|
|
|
|
|
|
/* prepend header */
|
2018-11-03 15:23:31 +00:00
|
|
|
head = logbuf_new_copy(header, strlen(header), lb);
|
2012-04-13 12:47:30 +00:00
|
|
|
if (!head) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to allocate memory\n");
|
2012-04-13 12:47:30 +00:00
|
|
|
logbuf_free(lb);
|
2014-11-21 15:10:37 +00:00
|
|
|
return NULL;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
lb = head;
|
|
|
|
|
|
|
|
/* prepend timestamp */
|
2018-11-03 15:23:31 +00:00
|
|
|
head = logbuf_new_alloc(32, lb);
|
2012-04-13 12:47:30 +00:00
|
|
|
if (!head) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to allocate memory\n");
|
2012-04-13 12:47:30 +00:00
|
|
|
logbuf_free(lb);
|
2014-11-21 15:10:37 +00:00
|
|
|
return NULL;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
lb = head;
|
|
|
|
time(&epoch);
|
|
|
|
utc = gmtime(&epoch);
|
|
|
|
lb->sz = strftime((char*)lb->buf, lb->sz, "%Y-%m-%d %H:%M:%S UTC ",
|
|
|
|
utc);
|
|
|
|
|
|
|
|
out:
|
2014-11-21 15:10:37 +00:00
|
|
|
return lb;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
/*
|
|
|
|
* Pcap writer for -X/-Y/-y options.
|
|
|
|
*/
|
|
|
|
static int content_pcap_fd = -1;
|
|
|
|
static char *content_pcap_fn = NULL;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initialize pcap content logging. For single-file mode, pcapfile is the
|
|
|
|
* path to the file. For dir/spec modes, pcapfile is NULL.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
log_content_pcap_preinit(const char *pcapfile)
|
|
|
|
{
|
|
|
|
if (!pcapfile)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* single file pcap mode */
|
|
|
|
|
|
|
|
content_pcap_fd = open(pcapfile, O_RDWR|O_CREAT, DFLT_FILEMODE);
|
|
|
|
if (content_pcap_fd == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to open '%s' for writing: %s (%i)\n",
|
|
|
|
pcapfile, strerror(errno), errno);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (logpkt_pcap_open_fd(content_pcap_fd) == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to prepare '%s' for PCAP writing"
|
|
|
|
": %s (%i)\n",
|
|
|
|
pcapfile, strerror(errno), errno);
|
|
|
|
close(content_pcap_fd);
|
|
|
|
content_pcap_fd = -1;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
content_pcap_fn = strdup(pcapfile);
|
|
|
|
if (!content_pcap_fn) {
|
|
|
|
close(content_pcap_fd);
|
|
|
|
content_pcap_fd = -1;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
log_content_pcap_fini(void)
|
|
|
|
{
|
|
|
|
if (content_pcap_fn) {
|
|
|
|
free(content_pcap_fn);
|
|
|
|
content_pcap_fn = NULL;
|
|
|
|
}
|
|
|
|
if (content_pcap_fd != -1) {
|
|
|
|
close(content_pcap_fd);
|
|
|
|
content_pcap_fd = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
log_content_pcap_reopencb(void) {
|
|
|
|
close(content_pcap_fd);
|
|
|
|
content_pcap_fd = privsep_client_openfile(content_pcap_clisock,
|
|
|
|
content_pcap_fn,
|
|
|
|
0);
|
|
|
|
if (content_pcap_fd == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to open '%s' for writing: %s (%i)\n",
|
|
|
|
content_pcap_fn, strerror(errno), errno);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (logpkt_pcap_open_fd(content_pcap_fd) == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to prepare '%s' for PCAP writing"
|
|
|
|
": %s (%i)\n",
|
|
|
|
content_pcap_fn, strerror(errno), errno);
|
|
|
|
close(content_pcap_fd);
|
|
|
|
content_pcap_fd = -1;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
log_content_pcap_closecb_base(void *fh, unsigned long ctl, int fd) {
|
|
|
|
log_content_pcap_ctx_t *ctx = fh;
|
|
|
|
int direction = (ctl & LBFLAG_IS_REQ) ? LOGPKT_REQUEST
|
|
|
|
: LOGPKT_RESPONSE;
|
|
|
|
|
|
|
|
logpkt_write_close(&ctx->state, fd, direction);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
log_content_pcap_closecb(void *fh, unsigned long ctl) {
|
|
|
|
log_content_pcap_ctx_t *ctx = fh;
|
|
|
|
log_content_pcap_closecb_base(fh, ctl, content_pcap_fd);
|
|
|
|
free(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
log_content_pcap_writecb_base(void *fh, unsigned long ctl,
|
|
|
|
const void *buf, size_t sz, int fd) {
|
|
|
|
log_content_pcap_ctx_t *ctx = fh;
|
|
|
|
int direction = (ctl & LBFLAG_IS_REQ) ? LOGPKT_REQUEST
|
|
|
|
: LOGPKT_RESPONSE;
|
|
|
|
|
|
|
|
if (logpkt_write_payload(&ctx->state, fd, direction, buf, sz) == -1)
|
|
|
|
goto errout;
|
|
|
|
|
|
|
|
return sz;
|
|
|
|
errout:
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to write to pcap log: %s (%i)\n",
|
|
|
|
strerror(errno), errno);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
log_content_pcap_writecb(UNUSED int level, void *fh, unsigned long ctl,
|
|
|
|
const void *buf, size_t sz) {
|
|
|
|
return log_content_pcap_writecb_base(fh, ctl, buf, sz, content_pcap_fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
log_content_pcap_dir_opencb(void *fh)
|
|
|
|
{
|
|
|
|
log_content_pcap_ctx_t *ctx = fh;
|
|
|
|
|
|
|
|
if ((ctx->u.dir.fd = privsep_client_openfile(content_pcap_clisock,
|
|
|
|
ctx->u.dir.filename,
|
|
|
|
0)) == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Opening pcapdir file '%s' failed: %s (%i)\n",
|
|
|
|
ctx->u.dir.filename, strerror(errno), errno);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return logpkt_pcap_open_fd(ctx->u.dir.fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
log_content_pcap_dir_closecb(void *fh, unsigned long ctl)
|
|
|
|
{
|
|
|
|
log_content_pcap_ctx_t *ctx = fh;
|
|
|
|
log_content_pcap_closecb_base(fh, ctl, ctx->u.dir.fd);
|
|
|
|
if (ctx->u.dir.filename)
|
|
|
|
free(ctx->u.dir.filename);
|
|
|
|
if (ctx->u.dir.fd != -1)
|
|
|
|
close(ctx->u.dir.fd);
|
|
|
|
free(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
log_content_pcap_dir_writecb(UNUSED int level, void *fh, unsigned long ctl,
|
|
|
|
const void *buf, size_t sz)
|
|
|
|
{
|
|
|
|
log_content_pcap_ctx_t *ctx = fh;
|
|
|
|
return log_content_pcap_writecb_base(fh, ctl, buf, sz, ctx->u.dir.fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
log_content_pcap_spec_opencb(void *fh)
|
|
|
|
{
|
|
|
|
log_content_pcap_ctx_t *ctx = fh;
|
|
|
|
|
|
|
|
if ((ctx->u.spec.fd = privsep_client_openfile(content_pcap_clisock,
|
|
|
|
ctx->u.spec.filename,
|
|
|
|
1)) == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Opening pcapspec file '%s' failed: %s (%i)\n",
|
|
|
|
ctx->u.spec.filename, strerror(errno), errno);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return logpkt_pcap_open_fd(ctx->u.spec.fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
log_content_pcap_spec_closecb(void *fh, unsigned long ctl)
|
|
|
|
{
|
|
|
|
log_content_pcap_ctx_t *ctx = fh;
|
|
|
|
log_content_pcap_closecb_base(fh, ctl, ctx->u.spec.fd);
|
|
|
|
if (ctx->u.spec.filename)
|
|
|
|
free(ctx->u.spec.filename);
|
|
|
|
if (ctx->u.spec.fd != -1)
|
|
|
|
close(ctx->u.spec.fd);
|
|
|
|
free(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
log_content_pcap_spec_writecb(UNUSED int level, void *fh, unsigned long ctl,
|
|
|
|
const void *buf, size_t sz)
|
|
|
|
{
|
|
|
|
log_content_pcap_ctx_t *ctx = fh;
|
|
|
|
return log_content_pcap_writecb_base(fh, ctl, buf, sz, ctx->u.spec.fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static logbuf_t *
|
|
|
|
log_content_pcap_prepcb(UNUSED void *fh, unsigned long prepflags,
|
|
|
|
logbuf_t *lb) {
|
|
|
|
/* log_content_pcap_ctx_t *ctx = fh; */
|
|
|
|
if (prepflags & PREPFLAG_EOF)
|
|
|
|
return lb;
|
|
|
|
logbuf_ctl_set(lb, (prepflags & PREPFLAG_REQUEST) ? LBFLAG_IS_REQ
|
|
|
|
: LBFLAG_IS_RESP);
|
|
|
|
return lb;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Mirror writer for -T/-I options.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
static int
|
|
|
|
log_content_mirror_preinit(const char *ifname, const char *targetip) {
|
|
|
|
char errbuf[LIBNET_ERRBUF_SIZE];
|
|
|
|
|
|
|
|
/* cast to char* needed on OpenBSD */
|
|
|
|
content_mirror_libnet = libnet_init(LIBNET_LINK, (char *)ifname,
|
|
|
|
errbuf);
|
|
|
|
if (content_mirror_libnet == NULL) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to init mirror libnet: %s\n", errbuf);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
libnet_seed_prand(content_mirror_libnet);
|
|
|
|
|
|
|
|
content_mirror_mtu = sys_get_mtu(ifname);
|
|
|
|
if (content_mirror_mtu == 0) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to lookup MTU of interface %s\n",
|
|
|
|
ifname);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (logpkt_ether_lookup(content_mirror_libnet,
|
|
|
|
content_mirror_src_ether,
|
|
|
|
content_mirror_dst_ether,
|
|
|
|
targetip, ifname) == -1) {
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to lookup target ether\n");
|
|
|
|
libnet_destroy(content_mirror_libnet);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
log_content_mirror_fini(void)
|
|
|
|
{
|
|
|
|
if (content_mirror_libnet) {
|
|
|
|
libnet_destroy(content_mirror_libnet);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
log_content_mirror_closecb(void *fh, unsigned long ctl) {
|
|
|
|
log_content_mirror_ctx_t *ctx = fh;
|
|
|
|
int direction = (ctl & LBFLAG_IS_REQ) ? LOGPKT_REQUEST
|
|
|
|
: LOGPKT_RESPONSE;
|
|
|
|
|
|
|
|
logpkt_write_close(&ctx->state, -1, direction);
|
|
|
|
free(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
log_content_mirror_writecb(UNUSED int level, void *fh, unsigned long ctl,
|
|
|
|
const void *buf, size_t sz) {
|
|
|
|
log_content_mirror_ctx_t *ctx = fh;
|
|
|
|
int direction = (ctl & LBFLAG_IS_REQ) ? LOGPKT_REQUEST
|
|
|
|
: LOGPKT_RESPONSE;
|
|
|
|
|
|
|
|
if (logpkt_write_payload(&ctx->state, -1, direction, buf, sz) == -1)
|
|
|
|
goto errout;
|
|
|
|
return sz;
|
|
|
|
|
|
|
|
errout:
|
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to write to mirror log: %s (%i)\n",
|
|
|
|
strerror(errno), errno);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static logbuf_t *
|
|
|
|
log_content_mirror_prepcb(UNUSED void *fh, unsigned long prepflags,
|
|
|
|
logbuf_t *lb) {
|
|
|
|
/* log_content_mirror_ctx_t *ctx = fh; */
|
|
|
|
if (prepflags & PREPFLAG_EOF)
|
|
|
|
return lb;
|
|
|
|
logbuf_ctl_set(lb, (prepflags & PREPFLAG_REQUEST) ? LBFLAG_IS_REQ
|
|
|
|
: LBFLAG_IS_RESP);
|
|
|
|
return lb;
|
|
|
|
}
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
2012-04-13 12:47:30 +00:00
|
|
|
|
2014-12-13 22:52:17 +00:00
|
|
|
/*
|
|
|
|
* Certificate writer for -w/-W options.
|
|
|
|
*/
|
|
|
|
static logger_t *cert_log = NULL;
|
|
|
|
static int cert_clisock = -1; /* privsep client socket for cert logger */
|
|
|
|
|
|
|
|
int
|
|
|
|
log_cert_submit(const char *fn, X509 *crt)
|
|
|
|
{
|
|
|
|
void *fh;
|
|
|
|
logbuf_t *lb;
|
|
|
|
char *pem;
|
|
|
|
|
|
|
|
if (!(fh = strdup(fn)))
|
|
|
|
goto errout1;
|
|
|
|
if (!(pem = ssl_x509_to_pem(crt)))
|
|
|
|
goto errout2;
|
2018-11-03 15:23:31 +00:00
|
|
|
if (!(lb = logbuf_new(0, pem, strlen(pem), NULL)))
|
2014-12-13 22:52:17 +00:00
|
|
|
goto errout3;
|
|
|
|
return logger_submit(cert_log, fh, 0, lb);
|
|
|
|
errout3:
|
|
|
|
free(pem);
|
|
|
|
errout2:
|
|
|
|
free(fh);
|
|
|
|
errout1:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
2018-11-03 15:23:31 +00:00
|
|
|
log_cert_writecb(UNUSED int level, void *fh, UNUSED unsigned long ctl,
|
|
|
|
const void *buf, size_t sz)
|
2014-12-13 22:52:17 +00:00
|
|
|
{
|
|
|
|
char *fn = fh;
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
if ((fd = privsep_client_certfile(cert_clisock, fn)) == -1) {
|
|
|
|
if (errno != EEXIST) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to open '%s': %s (%i)\n",
|
2014-12-13 22:52:17 +00:00
|
|
|
fn, strerror(errno), errno);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return sz;
|
|
|
|
}
|
|
|
|
if (write(fd, buf, sz) == -1) {
|
2017-10-14 22:39:30 +00:00
|
|
|
log_err_level_printf(LOG_CRIT, "Failed to write to '%s': %s (%i)\n",
|
2014-12-13 22:52:17 +00:00
|
|
|
fn, strerror(errno), errno);
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
close(fd);
|
|
|
|
return sz;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
/*
|
|
|
|
* Initialization and destruction.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Log pre-init: open all log files but don't start any threads, since we may
|
|
|
|
* fork() after pre-initialization.
|
|
|
|
* Return -1 on errors, 0 otherwise.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
log_preinit(opts_t *opts)
|
|
|
|
{
|
2014-11-25 22:45:40 +00:00
|
|
|
logger_reopen_func_t reopencb;
|
2014-11-21 15:10:37 +00:00
|
|
|
logger_open_func_t opencb;
|
|
|
|
logger_close_func_t closecb;
|
|
|
|
logger_write_func_t writecb;
|
|
|
|
logger_prep_func_t prepcb;
|
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
if (opts->contentlog) {
|
2014-11-21 11:03:08 +00:00
|
|
|
if (opts->contentlog_isdir) {
|
2014-11-25 22:45:40 +00:00
|
|
|
reopencb = NULL;
|
2018-11-03 15:23:31 +00:00
|
|
|
opencb = log_content_file_dir_opencb;
|
|
|
|
closecb = log_content_file_dir_closecb;
|
|
|
|
writecb = log_content_file_dir_writecb;
|
2014-11-21 15:10:37 +00:00
|
|
|
prepcb = NULL;
|
2014-11-21 11:03:08 +00:00
|
|
|
} else if (opts->contentlog_isspec) {
|
2014-11-25 22:45:40 +00:00
|
|
|
reopencb = NULL;
|
2018-11-03 15:23:31 +00:00
|
|
|
opencb = log_content_file_spec_opencb;
|
|
|
|
closecb = log_content_file_spec_closecb;
|
|
|
|
writecb = log_content_file_spec_writecb;
|
2014-11-21 15:10:37 +00:00
|
|
|
prepcb = NULL;
|
2012-04-13 12:47:30 +00:00
|
|
|
} else {
|
2018-11-03 15:23:31 +00:00
|
|
|
if (log_content_file_single_preinit(opts->contentlog) == -1)
|
2012-04-13 12:47:30 +00:00
|
|
|
goto out;
|
2018-11-03 15:23:31 +00:00
|
|
|
reopencb = log_content_file_single_reopencb;
|
2014-11-21 15:10:37 +00:00
|
|
|
opencb = NULL;
|
2018-11-03 15:23:31 +00:00
|
|
|
closecb = log_content_file_single_closecb;
|
|
|
|
writecb = log_content_file_single_writecb;
|
|
|
|
prepcb = log_content_file_single_prepcb;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
if (!(content_file_log = logger_new(reopencb, opencb, closecb,
|
|
|
|
writecb, prepcb,
|
|
|
|
log_exceptcb))) {
|
|
|
|
log_content_file_single_fini();
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (opts->pcaplog) {
|
|
|
|
if (log_content_pcap_preinit((opts->pcaplog_isdir ||
|
|
|
|
opts->pcaplog_isspec) ?
|
|
|
|
NULL :
|
|
|
|
opts->pcaplog) == -1)
|
|
|
|
goto out;
|
|
|
|
if (opts->pcaplog_isdir) {
|
|
|
|
reopencb = NULL;
|
|
|
|
opencb = log_content_pcap_dir_opencb;
|
|
|
|
closecb = log_content_pcap_dir_closecb;
|
|
|
|
writecb = log_content_pcap_dir_writecb;
|
|
|
|
prepcb = log_content_pcap_prepcb;
|
|
|
|
} else if (opts->pcaplog_isspec) {
|
|
|
|
reopencb = NULL;
|
|
|
|
opencb = log_content_pcap_spec_opencb;
|
|
|
|
closecb = log_content_pcap_spec_closecb;
|
|
|
|
writecb = log_content_pcap_spec_writecb;
|
|
|
|
prepcb = log_content_pcap_prepcb;
|
|
|
|
} else {
|
|
|
|
reopencb = log_content_pcap_reopencb;
|
|
|
|
opencb = NULL;
|
|
|
|
closecb = log_content_pcap_closecb;
|
|
|
|
writecb = log_content_pcap_writecb;
|
|
|
|
prepcb = log_content_pcap_prepcb;
|
|
|
|
}
|
|
|
|
if (!(content_pcap_log = logger_new(reopencb, opencb, closecb,
|
|
|
|
writecb, prepcb,
|
|
|
|
log_exceptcb))) {
|
|
|
|
log_content_pcap_fini();
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (opts->mirrorif) {
|
|
|
|
if (log_content_mirror_preinit(opts->mirrorif,
|
|
|
|
opts->mirrortarget) == -1)
|
|
|
|
goto out;
|
|
|
|
reopencb = NULL;
|
|
|
|
opencb = NULL;
|
|
|
|
closecb = log_content_mirror_closecb;
|
|
|
|
writecb = log_content_mirror_writecb;
|
|
|
|
prepcb = log_content_mirror_prepcb;
|
|
|
|
if (!(content_mirror_log = logger_new(reopencb, opencb, closecb,
|
|
|
|
writecb, prepcb,
|
|
|
|
log_exceptcb))) {
|
|
|
|
log_content_mirror_fini();
|
2012-04-13 12:47:30 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
#endif /* !WITHOUT_MIRROR */
|
2012-04-13 12:47:30 +00:00
|
|
|
if (opts->connectlog) {
|
2014-11-25 22:45:40 +00:00
|
|
|
if (log_connect_preinit(opts->connectlog) == -1)
|
2012-04-13 12:47:30 +00:00
|
|
|
goto out;
|
2016-03-25 14:56:42 +00:00
|
|
|
if (!(connect_log = logger_new(log_connect_reopencb,
|
|
|
|
NULL, NULL,
|
|
|
|
log_connect_writecb, NULL,
|
|
|
|
log_exceptcb))) {
|
2014-11-25 22:45:40 +00:00
|
|
|
log_connect_fini();
|
2012-04-13 12:47:30 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2018-02-27 19:20:58 +00:00
|
|
|
if (opts->masterkeylog) {
|
|
|
|
if (log_masterkey_preinit(opts->masterkeylog) == -1)
|
|
|
|
goto out;
|
|
|
|
if (!(masterkey_log = logger_new(log_masterkey_reopencb,
|
|
|
|
NULL, NULL,
|
|
|
|
log_masterkey_writecb, NULL,
|
|
|
|
log_exceptcb))) {
|
|
|
|
log_masterkey_fini();
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2014-12-13 22:52:17 +00:00
|
|
|
if (opts->certgendir) {
|
|
|
|
if (!(cert_log = logger_new(NULL, NULL, NULL, log_cert_writecb,
|
2016-03-25 14:56:42 +00:00
|
|
|
NULL, log_exceptcb)))
|
2014-12-13 22:52:17 +00:00
|
|
|
goto out;
|
|
|
|
}
|
2016-03-25 14:56:42 +00:00
|
|
|
if (!(err_log = logger_new(NULL, NULL, NULL, log_err_writecb, NULL,
|
|
|
|
log_exceptcb)))
|
2012-04-13 12:47:30 +00:00
|
|
|
goto out;
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (connect_log) {
|
2014-11-25 22:45:40 +00:00
|
|
|
log_connect_fini();
|
2012-04-13 12:47:30 +00:00
|
|
|
logger_free(connect_log);
|
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
if (content_file_log) {
|
|
|
|
log_content_file_single_fini();
|
|
|
|
logger_free(content_file_log);
|
|
|
|
}
|
|
|
|
if (content_pcap_log) {
|
|
|
|
log_content_pcap_fini();
|
|
|
|
logger_free(content_pcap_log);
|
|
|
|
}
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (content_mirror_log) {
|
|
|
|
log_content_mirror_fini();
|
|
|
|
logger_free(content_mirror_log);
|
|
|
|
}
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
2014-12-13 22:52:17 +00:00
|
|
|
if (cert_log) {
|
|
|
|
logger_free(cert_log);
|
|
|
|
}
|
2018-02-27 19:20:58 +00:00
|
|
|
if (masterkey_log) {
|
|
|
|
log_masterkey_fini();
|
|
|
|
logger_free(masterkey_log);
|
|
|
|
}
|
2012-04-13 12:47:30 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2014-11-24 21:01:52 +00:00
|
|
|
/*
|
|
|
|
* Close all file descriptors opened by log_preinit; used in privsep parent.
|
2018-02-27 19:20:58 +00:00
|
|
|
* Only undo content, connect and masterkey logs, leave error and debug log
|
|
|
|
* functional.
|
2014-11-24 21:01:52 +00:00
|
|
|
*/
|
|
|
|
void
|
|
|
|
log_preinit_undo(void)
|
|
|
|
{
|
|
|
|
if (connect_log) {
|
2014-11-25 22:45:40 +00:00
|
|
|
log_connect_fini();
|
2014-11-24 21:01:52 +00:00
|
|
|
logger_free(connect_log);
|
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
if (content_file_log) {
|
|
|
|
log_content_file_single_fini();
|
|
|
|
logger_free(content_file_log);
|
|
|
|
}
|
|
|
|
if (content_pcap_log) {
|
|
|
|
log_content_pcap_fini();
|
|
|
|
logger_free(content_pcap_log);
|
|
|
|
}
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (content_mirror_log) {
|
|
|
|
log_content_mirror_fini();
|
|
|
|
logger_free(content_mirror_log);
|
|
|
|
}
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
2018-02-27 19:20:58 +00:00
|
|
|
if (masterkey_log) {
|
|
|
|
log_masterkey_fini();
|
|
|
|
logger_free(masterkey_log);
|
|
|
|
}
|
2014-11-24 21:01:52 +00:00
|
|
|
}
|
|
|
|
|
2012-04-13 12:47:30 +00:00
|
|
|
/*
|
|
|
|
* Log post-init: start logging threads.
|
|
|
|
* Return -1 on errors, 0 otherwise.
|
|
|
|
*/
|
|
|
|
int
|
2018-11-03 15:23:31 +00:00
|
|
|
log_init(opts_t *opts, proxy_ctx_t *ctx, int clisock[5])
|
2012-04-13 12:47:30 +00:00
|
|
|
{
|
2016-03-25 14:56:42 +00:00
|
|
|
proxy_ctx = ctx;
|
2012-04-13 12:47:30 +00:00
|
|
|
if (err_log)
|
|
|
|
if (logger_start(err_log) == -1)
|
|
|
|
return -1;
|
2013-05-26 22:01:44 +00:00
|
|
|
if (!opts->debug) {
|
2014-11-23 14:44:20 +00:00
|
|
|
err_shortcut_logger = 1;
|
2013-05-26 22:01:44 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
|
|
|
|
if (masterkey_log) {
|
|
|
|
masterkey_clisock = clisock[0];
|
2018-02-27 19:20:58 +00:00
|
|
|
if (logger_start(masterkey_log) == -1)
|
|
|
|
return -1;
|
2018-11-03 15:23:31 +00:00
|
|
|
} else {
|
|
|
|
privsep_client_close(clisock[0]);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (connect_log) {
|
|
|
|
connect_clisock = clisock[1];
|
2012-04-13 12:47:30 +00:00
|
|
|
if (logger_start(connect_log) == -1)
|
|
|
|
return -1;
|
2018-11-03 15:23:31 +00:00
|
|
|
} else {
|
|
|
|
privsep_client_close(clisock[1]);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (content_file_log) {
|
|
|
|
content_file_clisock = clisock[2];
|
|
|
|
if (logger_start(content_file_log) == -1)
|
2012-04-13 12:47:30 +00:00
|
|
|
return -1;
|
2014-11-24 21:01:52 +00:00
|
|
|
} else {
|
2018-11-03 15:23:31 +00:00
|
|
|
privsep_client_close(clisock[2]);
|
2014-12-13 22:52:17 +00:00
|
|
|
}
|
2018-11-03 15:23:31 +00:00
|
|
|
|
|
|
|
if (content_pcap_log) {
|
|
|
|
content_pcap_clisock = clisock[3];
|
|
|
|
if (logger_start(content_pcap_log) == -1)
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
privsep_client_close(clisock[3]);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (content_mirror_log) {
|
|
|
|
if (logger_start(content_mirror_log) == -1)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
|
|
|
|
2014-12-13 22:52:17 +00:00
|
|
|
if (cert_log) {
|
2018-11-03 15:23:31 +00:00
|
|
|
cert_clisock = clisock[4];
|
2014-12-13 22:52:17 +00:00
|
|
|
if (logger_start(cert_log) == -1)
|
|
|
|
return -1;
|
|
|
|
} else {
|
2018-11-03 15:23:31 +00:00
|
|
|
privsep_client_close(clisock[4]);
|
2014-11-24 21:01:52 +00:00
|
|
|
}
|
2012-04-13 12:47:30 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Drain and cleanup. Tell all loggers to leave, then join all logger threads,
|
|
|
|
* and finally free resources and close log files.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
log_fini(void)
|
|
|
|
{
|
2014-11-24 20:33:41 +00:00
|
|
|
/* switch back to direct logging so we can still log errors while
|
|
|
|
* tearing down the logging infrastructure */
|
|
|
|
err_shortcut_logger = 1;
|
|
|
|
|
2014-12-13 22:52:17 +00:00
|
|
|
if (cert_log)
|
|
|
|
logger_leave(cert_log);
|
2018-02-27 19:20:58 +00:00
|
|
|
if (masterkey_log)
|
|
|
|
logger_leave(masterkey_log);
|
2018-11-03 15:23:31 +00:00
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (content_mirror_log)
|
|
|
|
logger_leave(content_mirror_log);
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
|
|
|
if (content_pcap_log)
|
|
|
|
logger_leave(content_pcap_log);
|
|
|
|
if (content_file_log)
|
|
|
|
logger_leave(content_file_log);
|
2012-04-13 12:47:30 +00:00
|
|
|
if (connect_log)
|
|
|
|
logger_leave(connect_log);
|
2014-11-24 20:33:41 +00:00
|
|
|
if (err_log)
|
|
|
|
logger_leave(err_log);
|
2012-04-13 12:47:30 +00:00
|
|
|
|
2014-12-13 22:52:17 +00:00
|
|
|
if (cert_log)
|
|
|
|
logger_join(cert_log);
|
2018-02-27 19:20:58 +00:00
|
|
|
if (masterkey_log)
|
|
|
|
logger_join(masterkey_log);
|
2018-11-03 15:23:31 +00:00
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (content_mirror_log)
|
|
|
|
logger_join(content_mirror_log);
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
|
|
|
if (content_pcap_log)
|
|
|
|
logger_join(content_pcap_log);
|
|
|
|
if (content_file_log)
|
|
|
|
logger_join(content_file_log);
|
2012-04-13 12:47:30 +00:00
|
|
|
if (connect_log)
|
|
|
|
logger_join(connect_log);
|
2014-11-24 20:33:41 +00:00
|
|
|
if (err_log)
|
|
|
|
logger_join(err_log);
|
2012-04-13 12:47:30 +00:00
|
|
|
|
2014-12-13 22:52:17 +00:00
|
|
|
if (cert_log)
|
|
|
|
logger_free(cert_log);
|
2018-02-27 19:20:58 +00:00
|
|
|
if (masterkey_log)
|
|
|
|
logger_free(masterkey_log);
|
2018-11-03 15:23:31 +00:00
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (content_mirror_log)
|
|
|
|
logger_free(content_mirror_log);
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
|
|
|
if (content_pcap_log)
|
|
|
|
logger_free(content_pcap_log);
|
|
|
|
if (content_file_log)
|
|
|
|
logger_free(content_file_log);
|
2012-04-13 12:47:30 +00:00
|
|
|
if (connect_log)
|
|
|
|
logger_free(connect_log);
|
2014-11-24 20:33:41 +00:00
|
|
|
if (err_log)
|
|
|
|
logger_free(err_log);
|
2012-04-13 12:47:30 +00:00
|
|
|
|
2018-02-27 19:20:58 +00:00
|
|
|
if (masterkey_log)
|
|
|
|
log_masterkey_fini();
|
2018-11-03 15:23:31 +00:00
|
|
|
#ifndef WITHOUT_MIRROR
|
|
|
|
if (content_mirror_log)
|
|
|
|
log_content_mirror_fini();
|
|
|
|
#endif /* !WITHOUT_MIRROR */
|
|
|
|
if (content_pcap_log)
|
|
|
|
log_content_pcap_fini();
|
|
|
|
if (content_file_log)
|
|
|
|
log_content_file_single_fini();
|
2012-04-13 12:47:30 +00:00
|
|
|
if (connect_log)
|
2014-11-25 22:45:40 +00:00
|
|
|
log_connect_fini();
|
2014-11-24 21:01:52 +00:00
|
|
|
|
2018-11-03 15:23:31 +00:00
|
|
|
if (masterkey_clisock != -1)
|
|
|
|
privsep_client_close(masterkey_clisock);
|
2014-12-13 22:52:17 +00:00
|
|
|
if (cert_clisock != -1)
|
|
|
|
privsep_client_close(cert_clisock);
|
2018-11-03 15:23:31 +00:00
|
|
|
if (content_file_clisock != -1)
|
|
|
|
privsep_client_close(content_file_clisock);
|
|
|
|
if (content_pcap_clisock != -1)
|
|
|
|
privsep_client_close(content_pcap_clisock);
|
|
|
|
if (connect_clisock != -1)
|
|
|
|
privsep_client_close(connect_clisock);
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
|
2014-11-25 22:45:40 +00:00
|
|
|
int
|
|
|
|
log_reopen(void)
|
|
|
|
{
|
|
|
|
int rv = 0;
|
|
|
|
|
2018-02-27 19:20:58 +00:00
|
|
|
if (masterkey_log)
|
|
|
|
if (logger_reopen(masterkey_log) == -1)
|
|
|
|
rv = -1;
|
2018-11-03 15:23:31 +00:00
|
|
|
if (content_pcap_log)
|
|
|
|
if (logger_reopen(content_pcap_log) == -1)
|
|
|
|
rv = -1;
|
|
|
|
if (content_file_log)
|
|
|
|
if (logger_reopen(content_file_log) == -1)
|
2014-11-25 22:45:40 +00:00
|
|
|
rv = -1;
|
|
|
|
if (connect_log)
|
|
|
|
if (logger_reopen(connect_log) == -1)
|
|
|
|
rv = -1;
|
|
|
|
|
|
|
|
return rv;
|
2012-04-13 12:47:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* vim: set noet ft=c: */
|