You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

syslogs.c 6.9KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274
  1. /*
  2. * Copyright (C) 2012 Michael Brown <mbrown@fensystems.co.uk>.
  3. *
  4. * This program is free software; you can redistribute it and/or
  5. * modify it under the terms of the GNU General Public License as
  6. * published by the Free Software Foundation; either version 2 of the
  7. * License, or any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful, but
  10. * WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  12. * General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, write to the Free Software
  16. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
  17. * 02110-1301, USA.
  18. */
  19. FILE_LICENCE ( GPL2_OR_LATER );
  20. /** @file
  21. *
  22. * Encrypted syslog protocol
  23. *
  24. */
  25. #include <stdint.h>
  26. #include <stdlib.h>
  27. #include <byteswap.h>
  28. #include <ipxe/xfer.h>
  29. #include <ipxe/open.h>
  30. #include <ipxe/tcpip.h>
  31. #include <ipxe/dhcp.h>
  32. #include <ipxe/settings.h>
  33. #include <ipxe/console.h>
  34. #include <ipxe/lineconsole.h>
  35. #include <ipxe/tls.h>
  36. #include <ipxe/syslog.h>
  37. #include <config/console.h>
  38. /* Set default console usage if applicable */
  39. #if ! ( defined ( CONSOLE_SYSLOGS ) && CONSOLE_EXPLICIT ( CONSOLE_SYSLOGS ) )
  40. #undef CONSOLE_SYSLOGS
  41. #define CONSOLE_SYSLOGS ( CONSOLE_USAGE_ALL & ~CONSOLE_USAGE_TUI )
  42. #endif
  43. struct console_driver syslogs_console __console_driver;
  44. /** The encrypted syslog server */
  45. static struct sockaddr_tcpip logserver = {
  46. .st_family = AF_INET,
  47. .st_port = htons ( SYSLOG_PORT ),
  48. };
  49. /**
  50. * Handle encrypted syslog TLS interface close
  51. *
  52. * @v intf Interface
  53. * @v rc Reason for close
  54. */
  55. static void syslogs_close ( struct interface *intf __unused, int rc ) {
  56. DBG ( "SYSLOGS console disconnected: %s\n", strerror ( rc ) );
  57. }
  58. /**
  59. * Handle encrypted syslog TLS interface window change
  60. *
  61. * @v intf Interface
  62. */
  63. static void syslogs_window_changed ( struct interface *intf ) {
  64. /* Mark console as enabled when window first opens, indicating
  65. * that TLS negotiation is complete. (Do not disable console
  66. * when window closes again, since TCP will close the window
  67. * whenever there is unACKed data.)
  68. */
  69. if ( xfer_window ( intf ) ) {
  70. if ( syslogs_console.disabled )
  71. DBG ( "SYSLOGS console connected\n" );
  72. syslogs_console.disabled = 0;
  73. }
  74. }
  75. /** Encrypted syslog TLS interface operations */
  76. static struct interface_operation syslogs_operations[] = {
  77. INTF_OP ( xfer_window_changed, struct interface *,
  78. syslogs_window_changed ),
  79. INTF_OP ( intf_close, struct interface *, syslogs_close ),
  80. };
  81. /** Encrypted syslog TLS interface descriptor */
  82. static struct interface_descriptor syslogs_desc =
  83. INTF_DESC_PURE ( syslogs_operations );
  84. /** The encrypted syslog TLS interface */
  85. static struct interface syslogs = INTF_INIT ( syslogs_desc );
  86. /******************************************************************************
  87. *
  88. * Console driver
  89. *
  90. ******************************************************************************
  91. */
  92. /** Encrypted syslog line buffer */
  93. static char syslogs_buffer[SYSLOG_BUFSIZE];
  94. /** Encrypted syslog severity */
  95. static unsigned int syslogs_severity = SYSLOG_DEFAULT_SEVERITY;
  96. /**
  97. * Handle ANSI set encrypted syslog priority (private sequence)
  98. *
  99. * @v count Parameter count
  100. * @v params List of graphic rendition aspects
  101. */
  102. static void syslogs_handle_priority ( unsigned int count __unused,
  103. int params[] ) {
  104. if ( params[0] >= 0 ) {
  105. syslogs_severity = params[0];
  106. } else {
  107. syslogs_severity = SYSLOG_DEFAULT_SEVERITY;
  108. }
  109. }
  110. /** Encrypted syslog ANSI escape sequence handlers */
  111. static struct ansiesc_handler syslogs_handlers[] = {
  112. { ANSIESC_LOG_PRIORITY, syslogs_handle_priority },
  113. { 0, NULL }
  114. };
  115. /** Encrypted syslog line console */
  116. static struct line_console syslogs_line = {
  117. .buffer = syslogs_buffer,
  118. .len = sizeof ( syslogs_buffer ),
  119. .ctx = {
  120. .handlers = syslogs_handlers,
  121. },
  122. };
  123. /** Encrypted syslog recursion marker */
  124. static int syslogs_entered;
  125. /**
  126. * Print a character to encrypted syslog console
  127. *
  128. * @v character Character to be printed
  129. */
  130. static void syslogs_putchar ( int character ) {
  131. int rc;
  132. /* Ignore if we are already mid-logging */
  133. if ( syslogs_entered )
  134. return;
  135. /* Fill line buffer */
  136. if ( line_putchar ( &syslogs_line, character ) == 0 )
  137. return;
  138. /* Guard against re-entry */
  139. syslogs_entered = 1;
  140. /* Send log message */
  141. if ( ( rc = syslog_send ( &syslogs, syslogs_severity,
  142. syslogs_buffer, "\n" ) ) != 0 ) {
  143. DBG ( "SYSLOGS could not send log message: %s\n",
  144. strerror ( rc ) );
  145. }
  146. /* Clear re-entry flag */
  147. syslogs_entered = 0;
  148. }
  149. /** Encrypted syslog console driver */
  150. struct console_driver syslogs_console __console_driver = {
  151. .putchar = syslogs_putchar,
  152. .disabled = 1,
  153. .usage = CONSOLE_SYSLOGS,
  154. };
  155. /******************************************************************************
  156. *
  157. * Settings
  158. *
  159. ******************************************************************************
  160. */
  161. /** Encrypted syslog server setting */
  162. struct setting syslogs_setting __setting ( SETTING_MISC ) = {
  163. .name = "syslogs",
  164. .description = "Encrypted syslog server",
  165. .tag = DHCP_EB_SYSLOGS_SERVER,
  166. .type = &setting_type_string,
  167. };
  168. /**
  169. * Apply encrypted syslog settings
  170. *
  171. * @ret rc Return status code
  172. */
  173. static int apply_syslogs_settings ( void ) {
  174. static char *old_server;
  175. char *server;
  176. struct interface *socket;
  177. int len;
  178. int rc;
  179. /* Fetch log server */
  180. len = fetch_string_setting_copy ( NULL, &syslogs_setting, &server );
  181. if ( len < 0 ) {
  182. rc = len;
  183. goto err_fetch_server;
  184. }
  185. /* Do nothing unless log server has changed */
  186. if ( ( ( server == NULL ) && ( old_server == NULL ) ) ||
  187. ( ( server != NULL ) && ( old_server != NULL ) &&
  188. ( strcmp ( server, old_server ) == 0 ) ) ) {
  189. rc = 0;
  190. goto out_no_change;
  191. }
  192. free ( old_server );
  193. old_server = NULL;
  194. /* Reset encrypted syslog connection */
  195. syslogs_console.disabled = 1;
  196. intf_restart ( &syslogs, 0 );
  197. /* Do nothing unless we have a log server */
  198. if ( ! server ) {
  199. DBG ( "SYSLOGS has no log server\n" );
  200. rc = 0;
  201. goto out_no_server;
  202. }
  203. /* Add TLS filter */
  204. if ( ( rc = add_tls ( &syslogs, server, &socket ) ) != 0 ) {
  205. DBG ( "SYSLOGS cannot create TLS filter: %s\n",
  206. strerror ( rc ) );
  207. goto err_add_tls;
  208. }
  209. /* Connect to log server */
  210. if ( ( rc = xfer_open_named_socket ( socket, SOCK_STREAM,
  211. (( struct sockaddr *) &logserver ),
  212. server, NULL ) ) != 0 ) {
  213. DBG ( "SYSLOGS cannot connect to log server: %s\n",
  214. strerror ( rc ) );
  215. goto err_open_named_socket;
  216. }
  217. DBG ( "SYSLOGS using log server %s\n", server );
  218. /* Record log server */
  219. old_server = server;
  220. server = NULL;
  221. /* Success */
  222. rc = 0;
  223. err_open_named_socket:
  224. err_add_tls:
  225. out_no_server:
  226. out_no_change:
  227. free ( server );
  228. err_fetch_server:
  229. return rc;
  230. }
  231. /** Encrypted syslog settings applicator */
  232. struct settings_applicator syslogs_applicator __settings_applicator = {
  233. .apply = apply_syslogs_settings,
  234. };