diff options
author | Toni Uhlig <matzeton@googlemail.com> | 2018-06-11 15:55:21 +0200 |
---|---|---|
committer | Toni Uhlig <matzeton@googlemail.com> | 2018-06-11 15:55:21 +0200 |
commit | 6faf24d6a8985d721e989f75505dae83c7dda20b (patch) | |
tree | fdef9211cd53431b5163351d06f67aaf1794bc45 | |
parent | 531e07c02848deec10eb1c9057c6d6b3d444ad73 (diff) |
POTD skeleton #101.
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
-rw-r--r-- | README | 2 | ||||
-rw-r--r-- | src/jail.c | 3 | ||||
-rw-r--r-- | src/main.c | 4 | ||||
-rw-r--r-- | src/pseccomp.c | 2 |
4 files changed, 9 insertions, 2 deletions
@@ -2,6 +2,8 @@ honey[potd]aemon ================ This project is part of a BA thesis. It is all but not finished yet. +(Currently) Supported protocols: + ssh with libssh Suits perfect for your favoured Desktop/Server/OpenWrt Linux system. @@ -381,17 +381,20 @@ static int jail_childfn(prisoner_process *ctx) sethostname("openwrt", SIZEOF("openwrt")); if (execl(path_shell, path_shell, (char *) NULL)) exit(EXIT_FAILURE); + break; default: if (set_fd_nonblock(master_fd)) { E_STRERR("Pty master fd nonblock for prisoner pid %d", child_pid); goto finalise; } + N("Socket to tty I/O for prisoner pid %d", child_pid); if (jail_socket_tty(ctx, master_fd)) E_STRERR("Socket to tty I/O for prisoner pid %d", child_pid); + N("Killing prisoner pid %d", child_pid); kill(child_pid, SIGTERM); i = 10; @@ -297,7 +297,7 @@ int main(int argc, char *argv[]) } if (process_options(1) != POSITIVE_VALIDATIONS) { - fprintf(stderr, "%s: invalid config detected\n", argv[0]); + fprintf(stderr, "%s: invalid/missing config detected\n", argv[0]); exit(EXIT_FAILURE); } @@ -308,6 +308,7 @@ int main(int argc, char *argv[]) } else { LOG_SET_FUNCS_VA(LOG_COLORED_FUNCS); } + if (getopt_used(OPT_LOGLEVEL)) { value = getopt_str(OPT_LOGLEVEL); if (!strcasecmp(value, "debug")) @@ -323,6 +324,7 @@ int main(int argc, char *argv[]) exit(EXIT_FAILURE); } } + if (log_open()) exit(EXIT_FAILURE); diff --git a/src/pseccomp.c b/src/pseccomp.c index a7a2f6f..1626721 100644 --- a/src/pseccomp.c +++ b/src/pseccomp.c @@ -78,7 +78,7 @@ static const int jail_allowed_syscalls[] = { SCMP_SYS(mprotect), SCMP_SYS(munmap), SCMP_SYS(futex), SCMP_SYS(open), SCMP_SYS(openat), SCMP_SYS(fstat), SCMP_SYS(fstat64), SCMP_SYS(access), SCMP_SYS(poll), SCMP_SYS(pipe), SCMP_SYS(pipe2), - SCMP_SYS(lseek), SCMP_SYS(stat), SCMP_SYS(readlink), SCMP_SYS(getcwd), + SCMP_SYS(lseek), SCMP_SYS(stat), SCMP_SYS(stat64), SCMP_SYS(readlink), SCMP_SYS(getcwd), SCMP_SYS(lstat), SCMP_SYS(sysinfo), SCMP_SYS(setuid), SCMP_SYS(setgid), SCMP_SYS(setresuid), SCMP_SYS(setresgid), |