summaryrefslogtreecommitdiffstats
path: root/sbin/iked/proc.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Extern privsep_process. Fixes compilation with -fno-common.mortimer2021-01-281-1/+3
| | | | ok deraadt@
* Cleanup after proc_init() in proc_close().tobhe2020-11-111-2/+16
|
* Prevent multiple ibuf leaks. Clean up on proccess shutdown.tobhe2020-04-081-2/+2
| | | | ok markus@
* Remove cpath pledge(2) promise. We decided that not deleting the unix controlmestre2018-08-061-4/+1
| | | | | | | sockets cause no harm and this way we close another attack surface by not allowing the daemon to create/delete any more files. OK kn@
* Stop accessing verbose and debug variables from log.c directly.reyk2017-01-091-2/+2
| | | | | | | | This replaces log_verbose() and "extern int verbose" with the two functions log_setverbose() and log_getverbose(). Pointed out by benno@ OK krw@ eric@ gilles@ (OK gilles@ for the snmpd bits as well)
* Add imsg "peerid" to debug messages (only within -DDEBUG).reyk2015-12-071-5/+7
|
* Sync proc.c, use shorter proc_compose[v]()reyk2015-12-071-12/+22
|
* EAGAIN handling for imsg_read. OK henning@ benno@claudio2015-12-051-2/+2
|
* Replace socket_set_blockmode() and fcntl(fd, F_SETFL, O_NONBLOCK) callsreyk2015-11-231-5/+3
| | | | | | with the SOCK_NONBLOCK flag to socket() and accept4(). OK claudio@ jung@
* Update log.c: change fatal() and fatalx() into variadic functions,reyk2015-11-221-9/+11
| | | | | | | include the process name, and replace all calls of fatal*(NULL) with fatal(__func__) for better debugging. OK benno@
* iked hereby pledges that it will run with restricted systemreyk2015-10-221-4/+13
| | | | | | | | | | | | | | | operations. This adds pledge(2) too all processes, including the iked parent process; the existing privsep design has been improved for better pledgeability. There haven't been any serious problems as it was already sane (eg. by receiving the PFKEYv2 and UDP sockets via fd passing). The control socket moved to an independent process to remove some abilities from the cert process. Committed in agreement with many but nobody was brave enough to OK it. Better testing will happen with having it in the tree. "It's the truth" deraadt@ "Let's see what happens" benno@
* Switch iked to C99-style fixed-width integer types.reyk2015-08-211-18/+19
| | | | OK mikeb@
* Replace <sys/param.h> with <limits.h> and other less dirty headers wherederaadt2015-01-161-2/+1
| | | | | | | | | possible. Annotate <sys/param.h> lines with their current reasons. Switch to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc. Change MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where sensible to avoid pulling in the pollution. These are the files confirmed through binary verification. ok guenther, millert, doug (helped with the verification protocol)
* Replace setpgrp(0, getpid()) with setpgid(0, 0). OK deraadt@ tedu@millert2014-12-161-2/+2
|
* Remove unnecessary netinet/in_systm.h include.lteo2014-10-251-2/+1
| | | | ok millert@
* Sync proc.c with httpd. httpd needs SIGUSR1 but iked will ignore itreyk2014-08-181-4/+5
| | | | | | now instead of terminating the process. ok mikeb@
* Sync msgbuf_write() changes from relayd.reyk2014-07-121-2/+2
| | | | | | | Please note that proc.c should be kept identical in relayd, iked and snmpd (currently without the includes). ok benno@
* match iked proc.c infrastructure with proc.cblambert2014-05-081-5/+12
| | | | ok reyk@
* no need to include rand.h now the RAND_seed() calls are gone.jsg2014-05-061-2/+1
| | | | ok reyk@
* With the recent change by deraadt@ to introduce kern.nosuidcoredump=3,reyk2014-05-041-13/+1
| | | | | | | we don't need the horrible debug hack anymore that disabled privdrop and chroot to get core dumps of privsep processes. No functional change for the normal binary, only if it is compiled with the non-default -DDEBUG option.
* Update iked to use the same proc.c that relayd uses.reyk2014-04-221-88/+311
| | | | | | Less differences, less code to audit. ok mikeb@
* round up some enemy sympathizers found calling RAND_seed().tedu2014-04-181-6/+1
| | | | ok beck reyk
* Fix the following idiom in the following way:blambert2014-04-141-1/+2
| | | | | | | | arc4random_buf(seed, sizeof(seed)); RAND_seed(seed, sizeof(seed)); + explicit_bzero(seed, sizeof(seed)); ok reyk@
* remove unused function that distracts from cleaning up the imsg_flush() messbenno2014-02-141-7/+1
| | | | ok krw, florian, henning
* Cope with the EAGAIN API change for msgbuf_write()mikeb2013-11-151-2/+2
|
* remove excessive includesderaadt2013-03-211-3/+2
|
* Remove private CVS tag from an obsolete repository and bump copyrightreyk2013-01-081-2/+2
| | | | to 2013 while I'm here... this is my way of saying "happy new year!".
* bump copyrightreyk2011-05-091-3/+2
|
* rename functions in proc.c to proc_* and move some code from imsg_util.c toreyk2011-05-091-36/+125
| | | | | proc.c. this is the first sync to what i did for relayd but does not include the multi-instance handling - so no functional change.
* Small tweak - add direct pointer to env instead of using an indirect one.reyk2011-05-051-1/+2
|
* Move the proc.c-specific runtime state out of struct iked into a sub-struct.reyk2011-05-051-74/+74
| | | | This removes iked-specific stuff from proc.c.
* rename iked_proc* to privsep_proc*. no functional change.reyk2011-05-051-15/+15
|
* pass proper argument to the proc_sig_handler and check env formikeb2010-09-161-7/+7
| | | | | | NULL before dereferencing. fixes an annoying crash. ok reyk
* Import iked, a new implementation of the IKEv2 protocol.reyk2010-06-031-0/+332
iked(8) is an automatic keying daemon for IPsec, like isakmpd(8), that IPsec creates flows and SAs automatically. Unlike isakmpd, iked(8) implements the newer IKEv2 protocol instead of IKEv1/ISAKMP. The daemon is still work-in-progress and not enabled in the builds, but is already able to establish IKEv2 sessions with some other IKEv2 implementations as a responder. with lots of help and debugging by jsg@ ok deraadt@