source: trunk/include/samhain.h@ 406

Last change on this file since 406 was 405, checked in by katerina, 12 years ago

Fix for tickets #303, #304, #305. #306, and #307. Update version number.

File size: 14.3 KB
Line 
1/* SAMHAIN file system integrity testing */
2/* Copyright (C) 1999 Rainer Wichmann */
3/* */
4/* This program is free software; you can redistribute it */
5/* and/or modify */
6/* it under the terms of the GNU General Public License as */
7/* published by */
8/* the Free Software Foundation; either version 2 of the License, or */
9/* (at your option) any later version. */
10/* */
11/* This program is distributed in the hope that it will be useful, */
12/* but WITHOUT ANY WARRANTY; without even the implied warranty of */
13/* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the */
14/* GNU General Public License for more details. */
15/* */
16/* You should have received a copy of the GNU General Public License */
17/* along with this program; if not, write to the Free Software */
18/* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
19
20#ifndef SAMHAIN_H
21#define SAMHAIN_H
22
23#include <sys/types.h>
24#include "slib.h"
25
26#ifdef SH_ENCRYPT
27#include "rijndael-api-fst.h"
28#endif
29
30/**************************************************
31 *
32 * STANDARD DEFINES
33 *
34 **************************************************/
35
36/* IPv6 */
37#if defined(HAVE_GETNAMEINFO) && defined(HAVE_GETADDRINFO)
38
39#if defined(SH_COMPILE_STATIC) && defined(__linux__)
40#undef USE_IPVX
41#define SH_SOCKMAX 1
42#else
43
44#if defined(USE_IPV4)
45#undef USE_IPVX
46#else
47#define USE_IPVX 1
48#endif
49
50#define SH_SOCKMAX 8
51#endif
52
53#else
54#undef USE_IPVX
55#define SH_SOCKMAX 1
56#endif
57
58/* end IPv6 */
59
60#define REPLACE_OLD
61
62/* Standard buffer sizes.
63 * IPv6 is 8 groups of 4 hex digits seperated by colons.
64 */
65#define SH_IP_BUF 48
66#define SH_MINIBUF 64
67#define SH_BUFSIZE 1024
68#define SH_MAXBUF 4096
69#define SH_PATHBUF 256
70#define SH_MSG_BUF 64512
71
72#define SH_ERRBUF_SIZE 64
73
74/* MAX_PATH_STORE must be >= KEY_LEN
75 */
76#define MAX_PATH_STORE 12287
77
78/* Sizes for arrays (user, group, timestamp).
79 */
80#define SOCKPASS_MAX 14
81#define USER_MAX 20
82#define GROUP_MAX 20
83#define TIM_MAX 32
84
85#define CMODE_SIZE 11
86
87#define ATTRBUF_SIZE 16
88#define ATTRBUF_USED 12
89
90/* The number of bytes in a key,
91 * the number of chars in its hex repesentation,
92 * and the block size of the hash algorithm.
93 */
94#define KEY_BYT 24
95#define KEY_LEN 48
96#define KEY_BLOCK 24
97#define KEYBUF_SIZE (KEY_LEN+1)
98
99/* The length of the compiled-in password.
100 */
101#define PW_LEN 8
102
103#undef GOOD
104#define GOOD 1
105#undef BAD
106#define BAD 0
107#undef ON
108#define ON 1
109#undef OFF
110#define OFF 0
111#undef S_TRUE
112#define S_TRUE 1
113#undef S_FALSE
114#define S_FALSE 0
115
116/* An unsigned integer guaranteed to be 32 bit.
117 */
118#if defined(HAVE_INT_32)
119#define UINT32 unsigned int
120#define SINT32 int
121#elif defined(HAVE_LONG_32)
122#define UINT32 unsigned long
123#define SINT32 long
124#elif defined(HAVE_SHORT_32)
125#define UINT32 unsigned short
126#define SINT32 short
127#endif
128
129#ifdef HAVE_INTTYPES_H
130#include <inttypes.h>
131#endif
132#ifdef HAVE_STDINT_H
133#include <stdint.h>
134#endif
135
136#if !defined(HAVE_UINT16_T)
137#define UINT16 unsigned short
138#else
139#define UINT16 uint16_t
140#endif
141
142#if !defined(HAVE_UINT64_T)
143
144#ifdef HAVE_LONG_LONG_64
145#define UINT64 unsigned long long
146#else
147#ifdef HAVE_LONG_64
148#define UINT64 unsigned long
149#else
150#error "no 64bit type found"
151#endif
152#endif
153
154#else
155#define UINT64 uint64_t
156#endif
157
158
159
160#define UBYTE unsigned char
161
162
163enum {
164 SH_CHECK_NONE = 0,
165 SH_CHECK_INIT = 1,
166 SH_CHECK_CHECK = 2
167};
168
169#define SH_MOD_THREAD 1
170#define SH_MOD_ACTIVE 0
171#define SH_MOD_FAILED -1
172#define SH_MOD_OFFSET 10
173
174/* Flags for file status
175 */
176#define SH_FFLAG_ALLIGNORE (1<<0)
177#define SH_FFLAG_VISITED (1<<1)
178#define SH_FFLAG_CHECKED (1<<3)
179#define SH_FFLAG_REPORTED (1<<3)
180#define SH_FFLAG_SUIDCHK (1<<4)
181
182#define SH_FFLAG_ALLIGNORE_SET(a) (((a) & SH_FFLAG_ALLIGNORE) != 0)
183#define SET_SH_FFLAG_ALLIGNORE(a) ((a) |= SH_FFLAG_ALLIGNORE)
184#define CLEAR_SH_FFLAG_ALLIGNORE(a) ((a) &= ~SH_FFLAG_ALLIGNORE)
185
186#define SH_FFLAG_VISITED_SET(a) (((a) & SH_FFLAG_VISITED) != 0)
187#define SET_SH_FFLAG_VISITED(a) ((a) |= SH_FFLAG_VISITED)
188#define CLEAR_SH_FFLAG_VISITED(a) ((a) &= ~SH_FFLAG_VISITED)
189
190#define SH_FFLAG_CHECKED_SET(a) (((a) & SH_FFLAG_VISITED) != 0)
191#define SET_SH_FFLAG_CHECKED(a) ((a) |= SH_FFLAG_VISITED)
192#define CLEAR_SH_FFLAG_CHECKED(a) ((a) &= ~SH_FFLAG_VISITED)
193
194#define SH_FFLAG_REPORTED_SET(a) (((a) & SH_FFLAG_REPORTED) != 0)
195#define SET_SH_FFLAG_REPORTED(a) ((a) |= SH_FFLAG_REPORTED)
196#define CLEAR_SH_FFLAG_REPORTED(a) ((a) &= ~SH_FFLAG_REPORTED)
197
198#define SH_FFLAG_SUIDCHK_SET(a) (((a) & SH_FFLAG_SUIDCHK) != 0)
199#define SET_SH_FFLAG_SUIDCHK(a) ((a) |= SH_FFLAG_SUIDCHK)
200#define CLEAR_SH_FFLAG_SUIDCHK(a) ((a) &= ~SH_FFLAG_SUIDCHK)
201
202/* Flags for inotify
203 */
204#define SH_INOTIFY_USE (1<<0)
205#define SH_INOTIFY_DOSCAN (1<<1)
206#define SH_INOTIFY_NEEDINIT (1<<2)
207#define SH_INOTIFY_INSCAN (1<<3)
208
209
210/**************************************************
211 *
212 * TYPEDEFS
213 *
214 **************************************************/
215
216enum {
217 SH_LEVEL_READONLY = 1,
218 SH_LEVEL_LOGFILES = 2,
219 SH_LEVEL_LOGGROW = 3,
220 SH_LEVEL_NOIGNORE = 4,
221 SH_LEVEL_ALLIGNORE = 5,
222 SH_LEVEL_ATTRIBUTES = 6,
223 SH_LEVEL_USER0 = 7,
224 SH_LEVEL_USER1 = 8,
225 SH_LEVEL_USER2 = 9,
226 SH_LEVEL_USER3 = 10,
227 SH_LEVEL_USER4 = 11,
228 SH_LEVEL_PRELINK = 12
229};
230
231typedef struct {
232 time_t alarm_interval;
233 time_t alarm_last;
234} sh_timer_t;
235
236typedef struct {
237 char path[SH_PATHBUF];
238 char hash[KEY_LEN+1];
239} sh_sh_df;
240
241typedef struct {
242 char user[USER_MAX];
243 char group[GROUP_MAX];
244 char home[SH_PATHBUF];
245 uid_t uid;
246 gid_t gid;
247} sh_sh_user;
248
249typedef struct {
250 char name[SH_PATHBUF]; /* local hostname */
251 char system[SH_MINIBUF]; /* system */
252 char release[SH_MINIBUF]; /* release */
253 char machine[SH_MINIBUF]; /* machine */
254} sh_sh_local;
255
256typedef struct {
257 char name[SH_PATHBUF];
258 char alt[SH_PATHBUF];
259} sh_sh_remote;
260
261typedef struct {
262 unsigned long bytes_hashed; /* bytes last check */
263 unsigned long bytes_speed; /* bytes/sec last check */
264 unsigned long mail_success; /* mails sent */
265 unsigned long mail_failed; /* mails not sent */
266 time_t time_start; /* start last check */
267 time_t time_check; /* time last check */
268 unsigned long dirs_checked; /* #dirs last check */
269 unsigned long files_checked; /* #files last check */
270 unsigned long files_report; /* #file reports */
271 unsigned long files_error; /* #file access error */
272 unsigned long files_nodir; /* #file not a directory*/
273} sh_sh_stat;
274
275typedef struct {
276 int exit; /* exit value */
277 int checkSum; /* whether to init/check checksums */
278 int update; /* update db */
279 int opts; /* reading cl options */
280 int started; /* finished with startup stuff */
281 int isdaemon; /* daemon or not */
282 int loop; /* go in loop even if not daemon */
283 int nice; /* desired nicety */
284 int isserver; /* server or not */
285 int islocked; /* BAD if logfile not locked */
286 int smsg; /* GOOD if end message sent */
287 int log_start; /* TRUE if new audit trail */
288 int reportonce; /* TRUE if bad files only once rep.*/
289 int fulldetail; /* TRUE if full details requested */
290 int client_severity; /* TRUE if client severity used */
291 int client_class; /* TRUE if client class used */
292 int audit;
293 unsigned long aud_mask;
294 int hidefile; /* TRUE if file not shown in log */
295 int inotify; /* Flags for inotify */
296} sh_sh_flag;
297
298typedef struct {
299
300 char prg_name[8];
301
302 UINT64 pid;
303
304 sh_sh_df exec;
305 sh_sh_df conf;
306 sh_sh_df data;
307
308 sh_sh_user real;
309 sh_sh_user effective;
310 sh_sh_user run;
311
312 sh_sh_local host;
313
314 sh_sh_remote srvtime;
315 sh_sh_remote srvmail;
316 sh_sh_remote srvexport;
317 sh_sh_remote srvcons;
318 sh_sh_remote srvlog;
319
320 sh_sh_stat statistics;
321 sh_sh_flag flag;
322
323#ifdef SH_STEALTH
324 unsigned long off_data;
325#endif
326
327 sh_timer_t mailNum;
328 sh_timer_t mailTime;
329 sh_timer_t fileCheck;
330
331 int looptime; /* timing for main loop */
332 /*@null@*//*@out@*/ char * timezone;
333} sh_struct;
334
335
336extern volatile int sig_raised;
337extern volatile int sig_urgent;
338extern volatile int sig_debug_switch; /* SIGUSR1 */
339extern volatile int sig_suspend_switch; /* SIGUSR2 */
340extern volatile int sh_global_suspend_flag;
341extern volatile int sig_fresh_trail; /* SIGIOT */
342extern volatile int sh_thread_pause_flag;
343extern volatile int sig_config_read_again; /* SIGHUP */
344extern volatile int sig_terminate; /* SIGQUIT */
345extern volatile int sig_termfast; /* SIGTERM */
346extern volatile int sig_force_check; /* SIGTTOU */
347
348extern long int eintr__result;
349
350extern int sh_argc_store;
351extern char ** sh_argv_store;
352
353#include "sh_calls.h"
354
355
356typedef struct {
357 char sh_sockpass[2*SOCKPASS_MAX+2];
358 char sigkey_old[KEY_LEN+1];
359 char sigkey_new[KEY_LEN+1];
360 char mailkey_old[KEY_LEN+1];
361 char mailkey_new[KEY_LEN+1];
362 char crypt[KEY_LEN+1];
363 char session[KEY_LEN+1];
364 char vernam[KEY_LEN+1];
365 int mlock_failed;
366
367 char pw[PW_LEN];
368
369 char poolv[KEY_BYT];
370 int poolc;
371
372 int rngI;
373 UINT32 rng0[3];
374 UINT32 rng1[3];
375 UINT32 rng2[3];
376
377 UINT32 res_vec[6];
378
379 UINT32 ErrFlag[2];
380
381#ifdef SH_ENCRYPT
382 /*@out@*/ keyInstance keyInstE;
383 /*@out@*/ keyInstance keyInstD;
384#endif
385} sh_key_t;
386
387extern sh_struct sh;
388/*@null@*/ extern sh_key_t *skey;
389
390/**************************************************
391 *
392 * macros
393 *
394 **************************************************/
395
396#if defined(__GNUC__) && (__GNUC__ >= 4)
397#define SH_GNUC_SENTINEL __attribute__((__sentinel__))
398#else
399#define SH_GNUC_SENTINEL
400#endif
401
402#if defined(__GNUC__) && (__GNUC__ >= 3)
403#undef SH_GNUC_PURE
404#define SH_GNUC_PURE __attribute__((pure))
405#undef SH_GNUC_CONST
406#define SH_GNUC_CONST __attribute__((const))
407#undef SH_GNUC_NORETURN
408#define SH_GNUC_NORETURN __attribute__((noreturn))
409#undef SH_GNUC_MALLOC
410#define SH_GNUC_MALLOC __attribute__((malloc))
411#else
412#undef SH_GNUC_PURE
413#define SH_GNUC_PURE
414#undef SH_GNUC_CONST
415#define SH_GNUC_CONST
416#undef SH_GNUC_NORETURN
417#define SH_GNUC_NORETURN
418#undef SH_GNUC_MALLOC
419#define SH_GNUC_MALLOC
420#endif
421
422
423/* The semantics of the built-in are that it is expected that expr == const
424 * for __builtin_expect ((expr), const)
425 */
426#if defined(__GNUC__) && (__GNUC__ > 2) && defined(__OPTIMIZE__)
427#define SH_LIKELY(expr) (__builtin_expect((expr), 1))
428#define SH_UNLIKELY(expr) (__builtin_expect((expr), 0))
429#else
430#define SH_LIKELY(expr) (expr)
431#define SH_UNLIKELY(expr) (expr)
432#endif
433
434/* signal-safe log function
435 */
436int safe_logger (int thesignal, int method, char * details);
437void safe_fatal (const char * details, const char *f, int l);
438
439#define SH_VALIDATE_EQ(a,b) \
440 do { \
441 if ((a) != (b)) safe_fatal(#a " != " #b, FIL__, __LINE__);\
442 } while (0)
443
444#define SH_VALIDATE_NE(a,b) \
445 do { \
446 if ((a) == (b)) safe_fatal(#a " == " #b, FIL__, __LINE__);\
447 } while (0)
448
449#define SH_VALIDATE_GE(a,b) \
450 do { \
451 if ((a) < (b)) safe_fatal(#a " < " #b, FIL__, __LINE__);\
452 } while (0)
453
454#if defined(HAVE_MLOCK) && !defined(HAVE_BROKEN_MLOCK)
455#define MLOCK(a, b) \
456 if ((skey != NULL) && skey->mlock_failed == SL_FALSE){ \
457 (void) sl_set_suid(); \
458 if (sh_unix_mlock(FIL__, __LINE__, a, b) < 0) skey->mlock_failed = SL_TRUE; \
459 (void) sl_unset_suid(); }
460#else
461#define MLOCK(a, b) \
462 ;
463#endif
464
465#if defined(HAVE_MLOCK) && !defined(HAVE_BROKEN_MLOCK)
466#define MUNLOCK(a, b) \
467 if ((skey != NULL) && skey->mlock_failed == SL_FALSE){ \
468 (void) sl_set_suid(); \
469 (void) sh_unix_munlock( a, b );\
470 (void) sl_unset_suid(); }
471#else
472#define MUNLOCK(a, b) \
473 ;
474#endif
475
476#ifdef SH_STEALTH
477void sh_do_encode (char * str, int len);
478#define sh_do_decode sh_do_encode
479#endif
480
481/* #if defined(SCREW_IT_UP)
482 * extern volatile int sh_not_traced;
483 * inline int sh_sigtrap_prepare();
484 * inline int sh_derr();
485 * #endif
486 */
487
488#if defined(SCREW_IT_UP) && (defined(__FreeBSD__) || defined(__linux__)) && defined(__i386__)
489#define BREAKEXIT(expr) \
490 do { \
491 int ixi; \
492 for (ixi = 0; ixi < 8; ++ixi) { \
493 if ((*(volatile unsigned *)((unsigned) expr + ixi) & 0xff) == 0xcc) \
494 _exit(EXIT_FAILURE); \
495 } \
496 } \
497 while (1 == 0)
498#else
499#define BREAKEXIT(expr)
500#endif
501
502
503
504#include "sh_cat.h"
505#include "sh_trace.h"
506#include "sh_mem.h"
507
508#endif
509
510/* CRIT: */
511/* NEW_CLIENT <client> */
512/* BAD_CLIENT <client> -- <details> */
513/* ERR_CLIENT <client> -- <details> */
514
515/* ALERT: */
516/* LOG_KEY samhain|yule <key> */
517/* STARTUP samhain|yule -- user <username> */
518/* EXIT samhain|yule */
519/* GOODSIG <file> <user> */
520/* FP_KEY <fingerprint> */
521/* GOODSIG_DAT <file> <user> */
522/* FP_KEY_DAT <fingerprint> */
523/* TIGER_CFG <file> <checksum> */
524/* TIGER_DAT <file> <checksum> */
525
526/* PANIC -- <details> */
527/* ERROR -- <details> */
528
529/* Policy */
530/* POLICY <code> <file> */
531/* <code> = MISSING || ADDED || NOT_A_DIRECTORY || <policy> */
532
533
534
Note: See TracBrowser for help on using the repository browser.