syslogd.h revision 1.7
1/*	$NetBSD: syslogd.h,v 1.7 2015/09/08 18:33:12 plunky Exp $	*/
2
3/*-
4 * Copyright (c) 2008 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Martin Sch�tte.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 *    notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in the
17 *    documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 *    must display the following acknowledgement:
20 *        This product includes software developed by the NetBSD
21 *        Foundation, Inc. and its contributors.
22 * 4. Neither the name of The NetBSD Foundation nor the names of its
23 *    contributors may be used to endorse or promote products derived
24 *    from this software without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 * POSSIBILITY OF SUCH DAMAGE.
37 */
38#ifndef SYSLOGD_H_
39#define SYSLOGD_H_
40/*
41 * hold common data structures and prototypes
42 * for syslogd.c and tls.c
43 *
44 */
45
46#include <sys/cdefs.h>
47#define MAXLINE		1024		/* maximum line length */
48#define MAXSVLINE	120		/* maximum saved line length */
49#define DEFUPRI		(LOG_USER|LOG_NOTICE)
50#define DEFSPRI		(LOG_KERN|LOG_NOTICE)
51#define TIMERINTVL	30		/* interval for checking flush, mark */
52#define TTYMSGTIME	1		/* timeout passed to ttymsg */
53
54#include <sys/param.h>
55#include <sys/socket.h>
56#include <sys/sysctl.h>
57#include <sys/types.h>
58#include <sys/un.h>
59#include <sys/wait.h>
60#include <sys/queue.h>
61#include <netinet/in.h>
62#include <sys/event.h>
63#include <event.h>
64
65#include <assert.h>
66#include <ctype.h>
67#include <errno.h>
68#include <fcntl.h>
69#include <grp.h>
70#include <locale.h>
71#include <netdb.h>
72#include <pwd.h>
73#include <signal.h>
74#include <stdarg.h>
75#include <stdio.h>
76#include <stdlib.h>
77#include <string.h>
78#include <unistd.h>
79#include <stdbool.h>
80#include <utmp.h>
81#ifdef __NetBSD_Version__
82#include <util.h>
83#include "utmpentry.h"
84#endif /* __NetBSD_Version__ */
85#ifdef __FreeBSD_version
86#include <libutil.h>
87#include <sys/stat.h>
88#include <sys/uio.h>
89#include <limits.h>
90#endif /* __FreeBSD_version */
91
92#ifndef DISABLE_TLS
93#include <netinet/tcp.h>
94#include <openssl/ssl.h>
95#endif /* !DISABLE_TLS */
96
97#include <sys/stdint.h>
98#include <sys/resource.h>
99
100#include "pathnames.h"
101#include <sys/syslog.h>
102
103/* some differences between the BSDs  */
104#ifdef __FreeBSD_version
105#undef _PATH_UNIX
106#define _PATH_UNIX "kernel"
107#define HAVE_STRNDUP 0
108#endif /* __FreeBSD_version */
109
110#ifdef __NetBSD_Version__
111#define HAVE_STRNDUP 1
112#define HAVE_DEHUMANIZE_NUMBER 1
113#endif /* __NetBSD_Version__ */
114
115#ifndef HAVE_DEHUMANIZE_NUMBER	/* not in my 4.0-STABLE yet */
116extern int dehumanize_number(const char *str, int64_t *size);
117#endif /* !HAVE_DEHUMANIZE_NUMBER */
118
119#if !HAVE_STRNDUP
120char *strndup(const char *str, size_t n);
121#endif /* !HAVE_STRNDUP */
122
123#ifdef LIBWRAP
124#include <tcpd.h>
125#endif
126
127#define FDMASK(fd)	(1 << (fd))
128
129#define A_CNT(x)	(sizeof((x)) / sizeof((x)[0]))
130
131/* debug messages with categories */
132#define D_NONE	   0
133#define D_CALL	   1	/* function calls */
134#define D_DATA	   2	/* syslog message reading/formatting */
135#define D_NET	   4	/* sockets/network */
136#define D_FILE	   8	/* local files */
137#define D_TLS	  16	/* TLS */
138#define D_PARSE	  32	/* configuration/parsing */
139#define D_EVENT	  64	/* libevent */
140#define D_BUFFER 128	/* message queues */
141#define D_MEM	 256	/* malloc/free */
142#define D_MEM2	1024	/* every single malloc/free */
143#define D_SIGN	2048	/* -sign */
144#define D_MISC	4096	/* everything else */
145#define D_ALL	(D_CALL | D_DATA | D_NET | D_FILE | D_TLS | D_PARSE |  \
146		 D_EVENT | D_BUFFER | D_MEM | D_MEM2 | D_SIGN | D_MISC)
147#define D_DEFAULT (D_CALL | D_NET | D_FILE | D_TLS | D_MISC)
148
149
150/* build with -DNDEBUG to remove all assert()s and DPRINTF()s */
151#ifdef NDEBUG
152#define DPRINTF(x, ...) (void)0
153#else
154void dbprintf(const char *, const char *, size_t, const char *, ...)
155    __printflike(4, 5);
156#define DPRINTF(x, ...) /*LINTED null effect */(void)(Debug & (x) \
157    ? dbprintf(__FILE__, __func__, __LINE__, __VA_ARGS__) : ((void)0))
158#endif
159
160/* shortcuts for libevent */
161#define EVENT_ADD(x) do {						\
162	DPRINTF(D_EVENT, "event_add(%s@%p)\n", #x, x);			\
163	if (event_add(x, NULL) == -1) {					\
164		DPRINTF(D_EVENT, "Failure in event_add()\n");		\
165	}								\
166} while (/*CONSTCOND*/0)
167#define RETRYEVENT_ADD(x) do {						\
168	struct timeval _tv;						\
169	_tv.tv_sec = 0;							\
170	_tv.tv_usec = TLS_RETRY_EVENT_USEC;				\
171	DPRINTF(D_EVENT, "retryevent_add(%s@%p)\n", #x, x);		\
172	if (event_add(x, &_tv) == -1) {					\
173		DPRINTF(D_EVENT, "Failure in event_add()\n");		\
174	}								\
175} while (/*CONSTCOND*/0)
176#define DEL_EVENT(x) do {						\
177	DPRINTF(D_MEM2, "DEL_EVENT(%s@%p)\n", #x, x);			\
178	if ((x) && (event_del(x) == -1)) {				\
179		DPRINTF(D_EVENT, "Failure in event_del()\n");		\
180	}								\
181} while (/*CONSTCOND*/0)
182
183/* safe calls to free() */
184#define FREEPTR(x)	if (x) {					\
185		DPRINTF(D_MEM2, "free(%s@%p)\n", #x, x);		\
186		free(x);	 x = NULL; }
187#define FREE_SSL(x)	if (x) {					\
188		DPRINTF(D_MEM2, "SSL_free(%s@%p)\n", #x, x);		\
189		SSL_free(x);	 x = NULL; }
190#define FREE_SSL_CTX(x) if (x) {					\
191		DPRINTF(D_MEM2, "SSL_CTX_free(%s@%p)\n", #x, x);	\
192		SSL_CTX_free(x); x = NULL; }
193
194/* reference counting macros for buffers */
195#define NEWREF(x) ((x) ? (DPRINTF(D_BUFFER, "inc refcount of " #x \
196			" @ %p: %zu --> %zu\n", (x), (x)->refcount, \
197			(x)->refcount + 1), (x)->refcount++, (x))\
198		       : (DPRINTF(D_BUFFER, "inc refcount of NULL!\n"), NULL))
199#define DELREF(x) /*LINTED null effect*/(void)((x) ? (DPRINTF(D_BUFFER, "dec refcount of " #x \
200			" @ %p: %zu --> %zu\n", (x), (x)->refcount, \
201			(x)->refcount - 1), buf_msg_free(x), NULL) \
202		       : (DPRINTF(D_BUFFER, "dec refcount of NULL!\n"), NULL))
203
204/* assumption:
205 * - malloc()/calloc() only fails if not enough memory available
206 * - once init() has set up all global variables etc.
207 *   the bulk of available memory is used for buffers
208 *   and can be freed if necessary
209 */
210#define MALLOC(ptr, size) do {						\
211	while(!(ptr = malloc(size))) {					\
212		DPRINTF(D_MEM, "Unable to allocate memory");		\
213		message_allqueues_purge();				\
214	}								\
215	DPRINTF(D_MEM2, "MALLOC(%s@%p, %zu)\n", #ptr, ptr, size);	\
216} while (/*CONSTCOND*/0)
217
218#define CALLOC(ptr, size) do {						\
219	while(!(ptr = calloc(1, size))) {				\
220		DPRINTF(D_MEM, "Unable to allocate memory");		\
221		message_allqueues_purge();				\
222	}								\
223	DPRINTF(D_MEM2, "CALLOC(%s@%p, %zu)\n", #ptr, ptr, size);	\
224} while (/*CONSTCOND*/0)
225
226/* define strlen(NULL) to be 0 */
227#define SAFEstrlen(x) ((x) ? strlen(x) : 0)
228
229/* shorthand to block/restore signals for the duration of one function */
230#define BLOCK_SIGNALS(omask, newmask) do {				\
231	sigemptyset(&newmask);						\
232	sigaddset(&newmask, SIGHUP);					\
233	sigaddset(&newmask, SIGALRM);					\
234	sigprocmask(SIG_BLOCK, &newmask, &omask);			\
235} while (/*CONSTCOND*/0)
236
237#define RESTORE_SIGNALS(omask) sigprocmask(SIG_SETMASK, &omask, NULL)
238
239/* small optimization to call send_queue() only if queue has elements */
240#define SEND_QUEUE(f) do {						\
241	if ((f)->f_qelements)						\
242		send_queue(0, 0, f);	      				\
243} while (/*CONSTCOND*/0)
244
245#define MAXUNAMES		20	/* maximum number of user names */
246#define BSD_TIMESTAMPLEN	14+1
247#define MAX_TIMESTAMPLEN	31+1
248
249/* maximum field lengths in syslog-protocol */
250#define PRI_MAX	      5
251#define HOST_MAX    255
252#define APPNAME_MAX  48
253#define PROCID_MAX  128
254#define MSGID_MAX    32
255/* longest possible header length */
256#define HEADER_LEN_MAX (PRI_MAX + 1 + 1 + MAX_TIMESTAMPLEN + 1 + HOST_MAX \
257			+ 1 + APPNAME_MAX + 1 + PROCID_MAX + 1 + MSGID_MAX)
258
259/* allowed number of priorities by IETF standards */
260#define IETF_NUM_PRIVALUES  192
261
262/* check if message with fac/sev belogs to a destination f */
263#define MATCH_PRI(f, fac, sev) \
264	   (  (((f)->f_pcmp[fac] & PRI_EQ) && ((f)->f_pmask[fac] == (sev))) \
265	    ||(((f)->f_pcmp[fac] & PRI_LT) && ((f)->f_pmask[fac]  < (sev)))  \
266	    ||(((f)->f_pcmp[fac] & PRI_GT) && ((f)->f_pmask[fac]  > (sev)))  \
267	   )
268
269/* shorthand to test Byte Order Mark which indicates UTF-8 content */
270#define IS_BOM(p) ( \
271    (p)[0] != '\0' && (unsigned char)(p)[0] == (unsigned char)0xEF && \
272    (p)[1] != '\0' && (unsigned char)(p)[1] == (unsigned char)0xBB && \
273    (p)[2] != '\0' && (unsigned char)(p)[2] == (unsigned char)0xBF)
274
275/* message buffer container used for processing, formatting, and queueing */
276struct buf_msg {
277	size_t	 refcount;
278	int	 pri;
279	int	 flags;
280	char	*timestamp;
281	char	*recvhost;
282	char	*host;
283	char	*prog;
284	char	*pid;
285	char	*msgid;
286	char	*sd;	    /* structured data */
287	char	*msg;	    /* message content */
288	char	*msgorig;   /* in case we advance *msg beyond header fields
289			       we still want to free() the original ptr  */
290	size_t	 msglen;    /* strlen(msg) */
291	size_t	 msgsize;   /* allocated memory size   */
292	size_t	 tlsprefixlen; /* bytes for the TLS length prefix */
293	size_t	 prilen;       /* bytes for priority and version  */
294};
295
296/* queue of messages */
297struct buf_queue {
298	struct buf_msg* msg;
299	STAILQ_ENTRY(buf_queue) entries;
300};
301STAILQ_HEAD(buf_queue_head, buf_queue);
302
303/* a pair of a socket and an associated event object */
304struct socketEvent {
305	int fd;
306	int af;
307	struct event *ev;
308};
309
310/*
311 * Flags to logmsg().
312 */
313#define IGN_CONS	0x001	/* don't print on console */
314#define SYNC_FILE	0x002	/* do fsync on file after printing */
315#define ADDDATE		0x004	/* add a date to the message */
316#define MARK		0x008	/* this message is a mark */
317#define ISKERNEL	0x010	/* kernel generated message */
318#define BSDSYSLOG	0x020	/* line in traditional BSD Syslog format */
319#define SIGN_MSG	0x040	/* syslog-sign data, not signed again */
320
321/* strategies for message_queue_purge() */
322#define PURGE_OLDEST		1
323#define PURGE_BY_PRIORITY	2
324
325/*
326 * This structure represents the files that will have log
327 * copies printed.
328 * We require f_file to be valid if f_type is F_FILE, F_CONSOLE, F_TTY,
329 * or if f_type is F_PIPE and f_pid > 0.
330 */
331
332struct filed {
333	struct	filed *f_next;		/* next in linked list */
334	short	f_type;			/* entry type, see below */
335	short	f_file;			/* file descriptor */
336	time_t	f_time;			/* time this was last written */
337	char	*f_host;		/* host from which to record */
338	u_char	f_pmask[LOG_NFACILITIES+1];	/* priority mask */
339	u_char	f_pcmp[LOG_NFACILITIES+1];	/* compare priority */
340#define PRI_LT	0x1
341#define PRI_EQ	0x2
342#define PRI_GT	0x4
343	char	*f_program;		/* program this applies to */
344	union {
345		char	f_uname[MAXUNAMES][UT_NAMESIZE+1];
346		struct {
347			char	f_hname[MAXHOSTNAMELEN];
348			struct	addrinfo *f_addr;
349		} f_forw;		/* UDP forwarding address */
350#ifndef DISABLE_TLS
351		struct {
352			SSL	*ssl;			/* SSL object  */
353			struct tls_conn_settings *tls_conn;  /* certificate info */
354		} f_tls;		/* TLS forwarding address */
355#endif /* !DISABLE_TLS */
356		char	f_fname[MAXPATHLEN];
357		struct {
358			char	f_pname[MAXPATHLEN];
359			pid_t	f_pid;
360		} f_pipe;
361	} f_un;
362#ifndef DISABLE_SIGN
363	struct signature_group_t *f_sg;	     /* one signature group */
364#endif /* !DISABLE_SIGN */
365	struct buf_queue_head f_qhead;	     /* undelivered msgs queue */
366	size_t	      	      f_qelements;   /* elements in queue */
367	size_t		      f_qsize;	     /* size of queue in bytes */
368	struct buf_msg	     *f_prevmsg;     /* last message logged */
369	struct event	     *f_sq_event;    /* timer for send_queue() */
370	int		      f_prevcount;   /* repetition cnt of prevmsg */
371	int		      f_repeatcount; /* number of "repeated" msgs */
372	int		      f_lasterror;   /* last error on writev() */
373	int		      f_flags;	     /* file-specific flags */
374#define FFLAG_SYNC	0x01	/* for F_FILE: fsync after every msg */
375#define FFLAG_FULL	0x02	/* for F_FILE | F_PIPE: write PRI header */
376#define FFLAG_SIGN	0x04	/* for syslog-sign with SG="3":
377				 * sign the messages to this destination */
378};
379
380#ifndef DISABLE_TLS
381
382/* linked list for allowed TLS peer credentials
383 * (one for fingerprint, one for cert-files)
384 */
385SLIST_HEAD(peer_cred_head, peer_cred);
386struct peer_cred {
387	SLIST_ENTRY(peer_cred) entries;
388	char *data;
389};
390
391/* config options for TLS server-side */
392struct tls_global_options_t {
393	SSL_CTX *global_TLS_CTX;
394	struct peer_cred_head fprint_head;  /* trusted client fingerprints */
395	struct peer_cred_head cert_head;    /* trusted client cert files   */
396	char *keyfile;	    /* file with private key	 */
397	char *certfile;	    /* file with own certificate */
398	char *CAfile;	    /* file with CA certificate	 */
399	char *CAdir;	    /* alternative: path to directory with CA certs */
400	char *x509verify;   /* level of peer verification */
401	char *bindhost;	    /* hostname/IP to bind to	  */
402	char *bindport;	    /* port/service to bind to	  */
403	char *server;	    /* if !NULL: do not listen to incoming TLS	  */
404	char *gen_cert;	    /* if !NULL: generate self-signed certificate */
405};
406
407/* TLS needs three sets of sockets:
408 * - listening sockets: a fixed size array TLS_Listen_Set, just like finet for UDP.
409 * - outgoing connections: managed as part of struct filed.
410 * - incoming connections: variable sized, thus a linked list TLS_Incoming.
411 */
412/* every connection has its own input buffer with status
413 * variables for message reading */
414SLIST_HEAD(TLS_Incoming, TLS_Incoming_Conn);
415
416struct TLS_Incoming_Conn {
417	SLIST_ENTRY(TLS_Incoming_Conn) entries;
418	struct tls_conn_settings *tls_conn;
419	int socket;
420	char *inbuf;		    /* input buffer */
421	size_t inbuflen;
422	size_t cur_msg_len;	    /* length of current msg */
423	size_t cur_msg_start;	    /* beginning of current msg */
424	size_t read_pos;	    /* ring buffer position to write to */
425	size_t errorcount;	    /* to close faulty connections */
426	bool closenow;		    /* close connection as soon as buffer processed */
427	bool dontsave;		    /* for receiving oversized messages w/o saving them */
428};
429
430#endif /* !DISABLE_TLS */
431
432#endif /*SYSLOGD_H_*/
433