1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
|
/*
This file is part of the TDE project
Copyright (C) 2011 Timothy Pearson <kb9vqf@pearsoncomputing.net>
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Library General Public
License as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Library General Public License for more details.
You should have received a copy of the GNU Library General Public License
along with this library; see the file COPYING.LIB. If not, write to
the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
Boston, MA 02110-1301, USA.
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <errno.h>
#include <fcntl.h>
#include <limits.h>
#include <dirent.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/select.h>
#include <sys/time.h>
#include <termios.h>
#include <signal.h>
#include <tqstring.h>
#include "config.h"
#define FIFO_FILE "/tmp/ksocket-global/tsak"
// #define DEBUG
int main (int argc, char *argv[])
{
int mPipe_fd;
char readbuf[128];
int numread;
bool authorized = false;
pid_t parentproc = getppid();
#ifdef DEBUG
printf("Parent pid is: %d\n\r", parentproc);
#endif
char parentexecutable[8192];
TQString procparent = TQString("/proc/%1/exe").arg(parentproc);
int chars = readlink(procparent.ascii(), parentexecutable, sizeof(parentexecutable));
parentexecutable[chars] = 0;
parentexecutable[8191] = 0;
procparent = parentexecutable;
#ifdef DEBUG
printf("Parent executable name and full path is: %s\n\r", procparent.ascii());
#endif
TQString tdeBinaryPath = TQString(KDE_BINDIR "/");
#ifdef DEBUG
printf("The TDE binary path is: %s\n\r", tdeBinaryPath.ascii());
#endif
if (!procparent.startsWith(tdeBinaryPath)) {
printf("Unauthorized path detected in calling process\n\r");
return 2;
}
else {
procparent = procparent.mid(tdeBinaryPath.length());
#ifdef DEBUG
printf("Parent executable name is: %s\n\r", procparent.ascii());
#endif
if ((procparent == "kdesktop") || (procparent == "kdesktop_lock") || (procparent == "kdm")) {
authorized = true;
}
else if (procparent == "kdeinit") {
printf("kdeinit detected\n\r");
// A bit more digging is needed to see if this is an authorized process or not
// Get the kdeinit command
char kdeinitcmdline[8192];
FILE *fp = fopen(TQString("/proc/%1/cmdline").arg(parentproc).ascii(),"r");
if (fp != NULL) {
if (fgets (kdeinitcmdline, 8192, fp) != NULL)
fclose (fp);
}
kdeinitcmdline[8191] = 0;
TQString kdeinitCommand = kdeinitcmdline;
// Also get the environment, specifically the path
TQString kdeinitEnvironment;
char kdeinitenviron[8192];
fp = fopen(TQString("/proc/%1/environ").arg(parentproc).ascii(),"r");
if (fp != NULL) {
int c;
int pos = 0;
do {
c = fgetc(fp);
kdeinitenviron[pos] = c;
pos++;
if (c == 0) {
TQString curEnvLine = kdeinitenviron;
if (curEnvLine.startsWith("PATH=")) {
kdeinitEnvironment = curEnvLine.mid(5);
}
pos = 0;
}
} while ((c != EOF) && (pos < 8192));
fclose (fp);
}
kdeinitenviron[8191] = 0;
#ifdef DEBUG
printf("Called executable name is: %s\n\r", kdeinitCommand.ascii());
printf("Environment is: %s\n\r", kdeinitEnvironment.ascii());
#endif
if ((kdeinitCommand == "kdesktop [kdeinit]") && (kdeinitEnvironment.startsWith(KDE_BINDIR))) {
authorized = true;
}
else {
return 4;
}
}
else {
printf("Unauthorized calling process detected\n\r");
return 3;
}
if (authorized == true) {
// OK, the calling process is authorized to retrieve SAK data
// First, flush the buffer
mPipe_fd = open(FIFO_FILE, O_RDWR | O_NONBLOCK);
numread = 1;
while (numread > 0) {
numread = read(mPipe_fd, readbuf, 128);
}
// Now wait for SAK press
mPipe_fd = open(FIFO_FILE, O_RDWR);
if (mPipe_fd > -1) {
numread = read(mPipe_fd, readbuf, 128);
readbuf[numread] = 0;
readbuf[127] = 0;
close(mPipe_fd);
if (strcmp(readbuf, "SAK\n\r") == 0) {
return 0;
}
else {
return 1;
}
}
return 6;
}
}
return 5;
}
|