xref: /openbsd-src/sbin/isakmpd/conf.c (revision f2da64fbbbf1b03f09f390ab01267c93dfd77c4c)
1 /* $OpenBSD: conf.c,v 1.106 2016/03/16 15:41:10 krw Exp $	 */
2 /* $EOM: conf.c,v 1.48 2000/12/04 02:04:29 angelos Exp $	 */
3 
4 /*
5  * Copyright (c) 1998, 1999, 2000, 2001 Niklas Hallqvist.  All rights reserved.
6  * Copyright (c) 2000, 2001, 2002 H�kan Olsson.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27  */
28 
29 /*
30  * This code was written under funding by Ericsson Radio Systems.
31  */
32 
33 #include <sys/types.h>
34 #include <sys/mman.h>
35 #include <sys/queue.h>
36 #include <sys/socket.h>
37 #include <sys/stat.h>
38 #include <netinet/in.h>
39 #include <arpa/inet.h>
40 #include <ctype.h>
41 #include <fcntl.h>
42 #include <stdio.h>
43 #include <stdlib.h>
44 #include <string.h>
45 #include <unistd.h>
46 #include <errno.h>
47 
48 #include "app.h"
49 #include "conf.h"
50 #include "log.h"
51 #include "monitor.h"
52 #include "util.h"
53 
54 static char    *conf_get_trans_str(int, char *, char *);
55 static void     conf_load_defaults(int);
56 #if 0
57 static int      conf_find_trans_xf(int, char *);
58 #endif
59 
60 struct conf_trans {
61 	TAILQ_ENTRY(conf_trans) link;
62 	int	 trans;
63 	enum conf_op {
64 		CONF_SET, CONF_REMOVE, CONF_REMOVE_SECTION
65 	}	 op;
66 	char	*section;
67 	char	*tag;
68 	char	*value;
69 	int	 override;
70 	int	 is_default;
71 };
72 
73 #define CONF_SECT_MAX 256
74 
75 TAILQ_HEAD(conf_trans_head, conf_trans) conf_trans_queue;
76 
77 struct conf_binding {
78 	LIST_ENTRY(conf_binding) link;
79 	char	*section;
80 	char	*tag;
81 	char	*value;
82 	int	 is_default;
83 };
84 
85 char	*conf_path = CONFIG_FILE;
86 LIST_HEAD(conf_bindings, conf_binding) conf_bindings[256];
87 
88 static char	*conf_addr;
89 static __inline__ u_int8_t
90 conf_hash(char *s)
91 {
92 	u_int8_t hash = 0;
93 
94 	while (*s) {
95 		hash = ((hash << 1) | (hash >> 7)) ^ tolower((unsigned char)*s);
96 		s++;
97 	}
98 	return hash;
99 }
100 
101 /*
102  * Insert a tag-value combination from LINE (the equal sign is at POS)
103  */
104 static int
105 conf_remove_now(char *section, char *tag)
106 {
107 	struct conf_binding *cb, *next;
108 
109 	for (cb = LIST_FIRST(&conf_bindings[conf_hash(section)]); cb;
110 	    cb = next) {
111 		next = LIST_NEXT(cb, link);
112 		if (strcasecmp(cb->section, section) == 0 &&
113 		    strcasecmp(cb->tag, tag) == 0) {
114 			LIST_REMOVE(cb, link);
115 			LOG_DBG((LOG_MISC, 95, "[%s]:%s->%s removed", section,
116 			    tag, cb->value));
117 			free(cb->section);
118 			free(cb->tag);
119 			free(cb->value);
120 			free(cb);
121 			return 0;
122 		}
123 	}
124 	return 1;
125 }
126 
127 static int
128 conf_remove_section_now(char *section)
129 {
130 	struct conf_binding *cb, *next;
131 	int	unseen = 1;
132 
133 	for (cb = LIST_FIRST(&conf_bindings[conf_hash(section)]); cb;
134 	    cb = next) {
135 		next = LIST_NEXT(cb, link);
136 		if (strcasecmp(cb->section, section) == 0) {
137 			unseen = 0;
138 			LIST_REMOVE(cb, link);
139 			LOG_DBG((LOG_MISC, 95, "[%s]:%s->%s removed", section,
140 			    cb->tag, cb->value));
141 			free(cb->section);
142 			free(cb->tag);
143 			free(cb->value);
144 			free(cb);
145 		}
146 	}
147 	return unseen;
148 }
149 
150 /*
151  * Insert a tag-value combination from LINE (the equal sign is at POS)
152  * into SECTION of our configuration database.
153  */
154 static int
155 conf_set_now(char *section, char *tag, char *value, int override,
156     int is_default)
157 {
158 	struct conf_binding *node = 0;
159 
160 	if (override)
161 		conf_remove_now(section, tag);
162 	else if (conf_get_str(section, tag)) {
163 		if (!is_default)
164 			log_print("conf_set_now: duplicate tag [%s]:%s, "
165 			    "ignoring...\n", section, tag);
166 		return 1;
167 	}
168 	node = calloc(1, sizeof *node);
169 	if (!node) {
170 		log_error("conf_set_now: calloc (1, %lu) failed",
171 		    (unsigned long)sizeof *node);
172 		return 1;
173 	}
174 	node->section = node->tag = node->value = NULL;
175 	if ((node->section = strdup(section)) == NULL)
176 		goto fail;
177 	if ((node->tag = strdup(tag)) == NULL)
178 		goto fail;
179 	if ((node->value = strdup(value)) == NULL)
180 		goto fail;
181 	node->is_default = is_default;
182 
183 	LIST_INSERT_HEAD(&conf_bindings[conf_hash(section)], node, link);
184 	LOG_DBG((LOG_MISC, 95, "conf_set_now: [%s]:%s->%s", node->section,
185 	    node->tag, node->value));
186 	return 0;
187 fail:
188 	free(node->value);
189 	free(node->tag);
190 	free(node->section);
191 	free(node);
192 	return 1;
193 }
194 
195 /*
196  * Parse the line LINE of SZ bytes.  Skip Comments, recognize section
197  * headers and feed tag-value pairs into our configuration database.
198  */
199 static void
200 conf_parse_line(int trans, char *line, int ln, size_t sz)
201 {
202 	char	*val;
203 	size_t	 i;
204 	int	 j;
205 	static char *section = 0;
206 
207 	/* Lines starting with '#' or ';' are comments.  */
208 	if (*line == '#' || *line == ';')
209 		return;
210 
211 	/* '[section]' parsing...  */
212 	if (*line == '[') {
213 		for (i = 1; i < sz; i++)
214 			if (line[i] == ']')
215 				break;
216 		free(section);
217 		if (i == sz) {
218 			log_print("conf_parse_line: %d:"
219 			    "unmatched ']', ignoring until next section", ln);
220 			section = 0;
221 			return;
222 		}
223 		section = malloc(i);
224 		if (!section) {
225 			log_print("conf_parse_line: %d: malloc (%lu) failed",
226 			    ln, (unsigned long)i);
227 			return;
228 		}
229 		strlcpy(section, line + 1, i);
230 		return;
231 	}
232 	/* Deal with assignments.  */
233 	for (i = 0; i < sz; i++)
234 		if (line[i] == '=') {
235 			/* If no section, we are ignoring the lines.  */
236 			if (!section) {
237 				log_print("conf_parse_line: %d: ignoring line "
238 				    "due to no section", ln);
239 				return;
240 			}
241 			line[strcspn(line, " \t=")] = '\0';
242 			val = line + i + 1 + strspn(line + i + 1, " \t");
243 			/* Skip trailing whitespace, if any */
244 			for (j = sz - (val - line) - 1; j > 0 &&
245 			    isspace((unsigned char)val[j]); j--)
246 				val[j] = '\0';
247 			/* XXX Perhaps should we not ignore errors?  */
248 			conf_set(trans, section, line, val, 0, 0);
249 			return;
250 		}
251 	/* Other non-empty lines are weird.  */
252 	i = strspn(line, " \t");
253 	if (line[i])
254 		log_print("conf_parse_line: %d: syntax error", ln);
255 }
256 
257 /* Parse the mapped configuration file.  */
258 static void
259 conf_parse(int trans, char *buf, size_t sz)
260 {
261 	char	*cp = buf;
262 	char	*bufend = buf + sz;
263 	char	*line;
264 	int	ln = 1;
265 
266 	line = cp;
267 	while (cp < bufend) {
268 		if (*cp == '\n') {
269 			/* Check for escaped newlines.  */
270 			if (cp > buf && *(cp - 1) == '\\')
271 				*(cp - 1) = *cp = ' ';
272 			else {
273 				*cp = '\0';
274 				conf_parse_line(trans, line, ln, cp - line);
275 				line = cp + 1;
276 			}
277 			ln++;
278 		}
279 		cp++;
280 	}
281 	if (cp != line)
282 		log_print("conf_parse: last line unterminated, ignored.");
283 }
284 
285 /*
286  * Auto-generate default configuration values for the transforms and
287  * suites the user wants.
288  *
289  * Resulting section names can be:
290  *  For main mode:
291  *     {BLF,3DES,CAST,AES,AES-{128,192,256}-{MD5,SHA,SHA2-{256,384,512}} \
292  *         [-GRP{1,2,5,14,15}][-{DSS,RSA_SIG}]
293  *  For quick mode:
294  *     QM-{proto}[-TRP]-{cipher}[-{hash}][-PFS[-{group}]]-SUITE
295  *     where
296  *       {proto}  = ESP, AH
297  *       {cipher} = 3DES, CAST, BLF, AES, AES-{128,192,256}, AESCTR
298  *       {hash}   = MD5, SHA, RIPEMD, SHA2-{256,384,512}
299  *       {group}  = GRP1, GRP2, GRP5, GRP14, GRP15
300  *
301  * DH group defaults to MODP_1024.
302  *
303  * XXX We may want to support USE_TRIPLEDES, etc...
304  * XXX No EC2N DH support here yet.
305  */
306 
307 /* Find the value for a section+tag in the transaction list.  */
308 static char *
309 conf_get_trans_str(int trans, char *section, char *tag)
310 {
311 	struct conf_trans *node, *nf = 0;
312 
313 	for (node = TAILQ_FIRST(&conf_trans_queue); node;
314 	    node = TAILQ_NEXT(node, link))
315 		if (node->trans == trans && strcasecmp(section, node->section)
316 		    == 0 && strcasecmp(tag, node->tag) == 0) {
317 			if (!nf)
318 				nf = node;
319 			else if (node->override)
320 				nf = node;
321 		}
322 	return nf ? nf->value : 0;
323 }
324 
325 #if 0
326 /* XXX Currently unused.  */
327 static int
328 conf_find_trans_xf(int phase, char *xf)
329 {
330 	struct conf_trans *node;
331 	char	*p;
332 
333 	/* Find the relevant transforms and suites, if any.  */
334 	for (node = TAILQ_FIRST(&conf_trans_queue); node;
335 	    node = TAILQ_NEXT(node, link))
336 		if ((phase == 1 && strcmp("Transforms", node->tag) == 0) ||
337 		    (phase == 2 && strcmp("Suites", node->tag) == 0)) {
338 			p = node->value;
339 			while ((p = strstr(p, xf)) != NULL)
340 				if (*(p + strlen(p)) &&
341 				    *(p + strlen(p)) != ',')
342 					p += strlen(p);
343 				else
344 					return 1;
345 		}
346 	return 0;
347 }
348 #endif
349 
350 static void
351 conf_load_defaults_mm(int tr, char *mme, char *mmh, char *mma, char *dhg,
352     char *mme_p, char *mma_p, char *dhg_p, char *mmh_p)
353 {
354 	char sect[CONF_SECT_MAX];
355 
356 	snprintf(sect, sizeof sect, "%s%s%s%s", mme_p, mmh_p, dhg_p, mma_p);
357 
358 	LOG_DBG((LOG_MISC, 95, "conf_load_defaults_mm: main mode %s", sect));
359 
360 	conf_set(tr, sect, "ENCRYPTION_ALGORITHM", mme, 0, 1);
361 	if (strcmp(mme, "BLOWFISH_CBC") == 0)
362 		conf_set(tr, sect, "KEY_LENGTH", CONF_DFLT_VAL_BLF_KEYLEN, 0,
363 		    1);
364         else if (strcmp(mme_p, "AES-128") == 0)
365                 conf_set(tr, sect, "KEY_LENGTH", "128,128:128", 0, 1);
366         else if (strcmp(mme_p, "AES-192") == 0)
367                 conf_set(tr, sect, "KEY_LENGTH", "192,192:192", 0, 1);
368         else if (strcmp(mme_p, "AES-256") == 0)
369                 conf_set(tr, sect, "KEY_LENGTH", "256,256:256", 0, 1);
370 	else if (strcmp(mme, "AES_CBC") == 0)
371 		conf_set(tr, sect, "KEY_LENGTH", CONF_DFLT_VAL_AES_KEYLEN, 0,
372 		    1);
373 
374 	conf_set(tr, sect, "HASH_ALGORITHM", mmh, 0, 1);
375 	conf_set(tr, sect, "AUTHENTICATION_METHOD", mma, 0, 1);
376 	conf_set(tr, sect, "GROUP_DESCRIPTION", dhg, 0, 1);
377 	conf_set(tr, sect, "Life", CONF_DFLT_TAG_LIFE_MAIN_MODE, 0, 1);
378 }
379 
380 static void
381 conf_load_defaults_qm(int tr, char *qme, char *qmh, char *dhg, char *qme_p,
382     char *qmh_p, char *qm_ah_id, char *dhg_p, int proto, int mode, int pfs)
383 {
384 	char sect[CONF_SECT_MAX], tmp[CONF_SECT_MAX];
385 
386 	/* Helper #defines, incl abbreviations.  */
387 #define PROTO(x)  ((x) ? "AH" : "ESP")
388 #define PFS(x)    ((x) ? "-PFS" : "")
389 #define MODE(x)   ((x) ? "TRANSPORT" : "TUNNEL")
390 #define MODE_p(x) ((x) ? "-TRP" : "")
391 
392 	/* For AH a hash must be present and no encryption is allowed */
393 	if (proto == 1 && (strcmp(qmh, "NONE") == 0 ||
394 	    strcmp(qme, "NONE") != 0))
395 		return;
396 
397 	/* For ESP encryption must be provided, an empty hash is ok. */
398 	if (proto == 0 && strcmp(qme, "NONE") == 0)
399 		return;
400 
401 	/* When PFS is disabled no DH group must be specified. */
402 	if (pfs == 0 && strcmp(dhg_p, ""))
403 		return;
404 
405 	/* For GCM no additional authentication must be specified */
406 	if (proto == 0 && strcmp(qmh, "NONE") != 0 &&
407 	    (strcmp(qme, "AES_GCM_16") == 0 || strcmp(qme, "AES_GMAC") == 0))
408 		return;
409 
410 	snprintf(tmp, sizeof tmp, "QM-%s%s%s%s%s%s", PROTO(proto),
411 	    MODE_p(mode), qme_p, qmh_p, PFS(pfs), dhg_p);
412 
413 	strlcpy(sect, tmp, CONF_SECT_MAX);
414 	strlcat(sect, "-SUITE",	CONF_SECT_MAX);
415 
416 	LOG_DBG((LOG_MISC, 95, "conf_load_defaults_qm: quick mode %s", sect));
417 
418 	conf_set(tr, sect, "Protocols", tmp, 0, 1);
419 	snprintf(sect, sizeof sect, "IPSEC_%s", PROTO(proto));
420 	conf_set(tr, tmp, "PROTOCOL_ID", sect, 0, 1);
421 	strlcpy(sect, tmp, CONF_SECT_MAX);
422 	strlcat(sect, "-XF", CONF_SECT_MAX);
423 	conf_set(tr, tmp, "Transforms", sect, 0, 1);
424 
425 	/*
426 	 * XXX For now, defaults
427 	 * contain one xf per protocol.
428 	 */
429 	if (proto == 0)
430 		conf_set(tr, sect, "TRANSFORM_ID", qme, 0, 1);
431 	else
432 		conf_set(tr, sect, "TRANSFORM_ID", qm_ah_id, 0, 1);
433 	if (strcmp(qme ,"BLOWFISH") == 0)
434 		conf_set(tr, sect, "KEY_LENGTH", CONF_DFLT_VAL_BLF_KEYLEN, 0,
435 			 1);
436 	else if (strcmp(qme_p, "-AES-128") == 0 ||
437 	    strcmp(qme_p, "-AESCTR-128") == 0 ||
438 	    strcmp(qme_p, "-AESGCM-128") == 0 ||
439 	    strcmp(qme_p, "-AESGMAC-128") == 0)
440 		conf_set(tr, sect, "KEY_LENGTH", "128,128:128", 0, 1);
441 	else if (strcmp(qme_p, "-AES-192") == 0 ||
442 	    strcmp(qme_p, "-AESCTR-192") == 0 ||
443 	    strcmp(qme_p, "-AESGCM-192") == 0 ||
444 	    strcmp(qme_p, "-AESGMAC-192") == 0)
445 		conf_set(tr, sect, "KEY_LENGTH", "192,192:192", 0, 1);
446 	else if (strcmp(qme_p, "-AES-256") == 0 ||
447 	    strcmp(qme_p, "-AESCTR-256") == 0 ||
448 	    strcmp(qme_p, "-AESGCM-256") == 0 ||
449 	    strcmp(qme_p, "-AESGMAC-256") == 0)
450 		conf_set(tr, sect, "KEY_LENGTH", "256,256:256", 0, 1);
451 	else if	(strcmp(qme, "AES") == 0)
452 		conf_set(tr, sect, "KEY_LENGTH", CONF_DFLT_VAL_AES_KEYLEN, 0,
453 			 1);
454 
455 	conf_set(tr, sect, "ENCAPSULATION_MODE", MODE(mode), 0, 1);
456 	if (strcmp(qmh, "NONE")) {
457 		conf_set(tr, sect, "AUTHENTICATION_ALGORITHM", qmh, 0, 1);
458 
459 		/* XXX Another shortcut to keep length down */
460 		if (pfs)
461 			conf_set(tr, sect, "GROUP_DESCRIPTION", dhg, 0, 1);
462 	}
463 
464 	/* XXX Lifetimes depending on enc/auth strength? */
465 	conf_set(tr, sect, "Life", CONF_DFLT_TAG_LIFE_QUICK_MODE, 0, 1);
466 }
467 
468 static void
469 conf_load_defaults(int tr)
470 {
471 	int	 enc, auth, hash, group, proto, mode, pfs;
472 	char	*dflt;
473 
474 	char	*mm_auth[] = {"PRE_SHARED", "DSS", "RSA_SIG", 0};
475 	char	*mm_auth_p[] = {"", "-DSS", "-RSA_SIG", 0};
476 	char	*mm_hash[] = {"MD5", "SHA", "SHA2_256", "SHA2_384", "SHA2_512",
477 		     0};
478 	char	*mm_hash_p[] = {"-MD5", "-SHA", "-SHA2-256", "-SHA2-384",
479 		    "-SHA2-512", "", 0 };
480 	char	*mm_enc[] = {"BLOWFISH_CBC", "3DES_CBC", "CAST_CBC",
481 		    "AES_CBC", "AES_CBC", "AES_CBC", "AES_CBC", 0};
482 	char	*mm_enc_p[] = {"BLF", "3DES", "CAST", "AES", "AES-128",
483 		    "AES-192", "AES-256", 0};
484 	char	*dhgroup[] = {"MODP_1024", "MODP_768", "MODP_1024",
485 		    "MODP_1536", "MODP_2048", "MODP_3072", "MODP_4096",
486 		    "MODP_6144", "MODP_8192", 0};
487 	char	*dhgroup_p[] = {"", "-GRP1", "-GRP2", "-GRP5", "-GRP14",
488 		    "-GRP15", "-GRP16", "-GRP17", "-GRP18", 0};
489 	char	*qm_enc[] = {"3DES", "CAST", "BLOWFISH", "AES",
490 		    "AES", "AES", "AES", "AES_CTR", "AES_CTR", "AES_CTR",
491 		    "AES_CTR", "AES_GCM_16",
492 		    "AES_GCM_16", "AES_GCM_16", "AES_GMAC", "AES_GMAC",
493 		    "AES_GMAC", "NULL", "NONE", 0};
494 	char	*qm_enc_p[] = {"-3DES", "-CAST", "-BLF", "-AES",
495 		    "-AES-128", "-AES-192", "-AES-256", "-AESCTR",
496 		    "-AESCTR-128", "-AESCTR-192", "-AESCTR-256",
497 		    "-AESGCM-128", "-AESGCM-192", "-AESGCM-256",
498 		    "-AESGMAC-128", "-AESGMAC-192", "-AESGMAC-256", "-NULL",
499 		    "", 0};
500 	char	*qm_hash[] = {"HMAC_MD5", "HMAC_SHA", "HMAC_RIPEMD",
501 		    "HMAC_SHA2_256", "HMAC_SHA2_384", "HMAC_SHA2_512", "NONE",
502 		    0};
503 	char	*qm_hash_p[] = {"-MD5", "-SHA", "-RIPEMD", "-SHA2-256",
504 		    "-SHA2-384", "-SHA2-512", "", 0};
505 	char	*qm_ah_id[] = {"MD5", "SHA", "RIPEMD", "SHA2_256", "SHA2_384",
506 		    "SHA2_512", "", 0};
507 
508 	/* General and X509 defaults */
509 	conf_set(tr, "General", "Retransmits", CONF_DFLT_RETRANSMITS, 0, 1);
510 	conf_set(tr, "General", "Exchange-max-time", CONF_DFLT_EXCH_MAX_TIME,
511 	    0, 1);
512 	conf_set(tr, "General", "Use-Keynote", CONF_DFLT_USE_KEYNOTE, 0, 1);
513 	conf_set(tr, "General", "Policy-file", CONF_DFLT_POLICY_FILE, 0, 1);
514 	conf_set(tr, "General", "Pubkey-directory", CONF_DFLT_PUBKEY_DIR, 0,
515 	    1);
516 
517 	conf_set(tr, "X509-certificates", "CA-directory",
518 	    CONF_DFLT_X509_CA_DIR, 0, 1);
519 	conf_set(tr, "X509-certificates", "Cert-directory",
520 	    CONF_DFLT_X509_CERT_DIR, 0, 1);
521 	conf_set(tr, "X509-certificates", "Private-key",
522 	    CONF_DFLT_X509_PRIVATE_KEY, 0, 1);
523 	conf_set(tr, "X509-certificates", "Private-key-directory",
524 	    CONF_DFLT_X509_PRIVATE_KEY_DIR, 0, 1);
525 	conf_set(tr, "X509-certificates", "CRL-directory",
526 	    CONF_DFLT_X509_CRL_DIR, 0, 1);
527 
528 	conf_set(tr, "KeyNote", "Credential-directory",
529 	    CONF_DFLT_KEYNOTE_CRED_DIR, 0, 1);
530 
531 	conf_set(tr, "General", "Delete-SAs", CONF_DFLT_DELETE_SAS, 0, 1);
532 
533 	/* Lifetimes. XXX p1/p2 vs main/quick mode may be unclear.  */
534 	dflt = conf_get_trans_str(tr, "General", "Default-phase-1-lifetime");
535 	conf_set(tr, CONF_DFLT_TAG_LIFE_MAIN_MODE, "LIFE_TYPE",
536 	    CONF_DFLT_TYPE_LIFE_MAIN_MODE, 0, 1);
537 	conf_set(tr, CONF_DFLT_TAG_LIFE_MAIN_MODE, "LIFE_DURATION",
538 	    (dflt ? dflt : CONF_DFLT_VAL_LIFE_MAIN_MODE), 0, 1);
539 
540 	dflt = conf_get_trans_str(tr, "General", "Default-phase-2-lifetime");
541 	conf_set(tr, CONF_DFLT_TAG_LIFE_QUICK_MODE, "LIFE_TYPE",
542 	    CONF_DFLT_TYPE_LIFE_QUICK_MODE, 0, 1);
543 	conf_set(tr, CONF_DFLT_TAG_LIFE_QUICK_MODE, "LIFE_DURATION",
544 	    (dflt ? dflt : CONF_DFLT_VAL_LIFE_QUICK_MODE), 0, 1);
545 
546 	/* Default Phase-1 Configuration section */
547 	conf_set(tr, CONF_DFLT_TAG_PHASE1_CONFIG, "EXCHANGE_TYPE",
548 	    CONF_DFLT_PHASE1_EXCH_TYPE, 0, 1);
549 	conf_set(tr, CONF_DFLT_TAG_PHASE1_CONFIG, "Transforms",
550 	    CONF_DFLT_PHASE1_TRANSFORMS, 0, 1);
551 
552 	/* Main modes */
553 	for (enc = 0; mm_enc[enc]; enc++)
554 		for (hash = 0; mm_hash[hash]; hash++)
555 			for (auth = 0; mm_auth[auth]; auth++)
556 				for (group = 0; dhgroup_p[group]; group++)
557 					conf_load_defaults_mm (tr, mm_enc[enc],
558 					    mm_hash[hash], mm_auth[auth],
559 					    dhgroup[group], mm_enc_p[enc],
560 					    mm_auth_p[auth], dhgroup_p[group],
561 					    mm_hash_p[hash]);
562 
563 	/* Setup a default Phase 1 entry */
564 	conf_set(tr, "Phase 1", "Default", "Default-phase-1", 0, 1);
565 	conf_set(tr, "Default-phase-1", "Phase", "1", 0, 1);
566 	conf_set(tr, "Default-phase-1", "Configuration",
567 	    "Default-phase-1-configuration", 0, 1);
568 	dflt = conf_get_trans_str(tr, "General", "Default-phase-1-ID");
569 	if (dflt)
570 		conf_set(tr, "Default-phase-1", "ID", dflt, 0, 1);
571 
572 	/* Quick modes */
573 	for (enc = 0; qm_enc[enc]; enc++)
574 		for (proto = 0; proto < 2; proto++)
575 			for (mode = 0; mode < 2; mode++)
576 				for (pfs = 0; pfs < 2; pfs++)
577 					for (hash = 0; qm_hash[hash]; hash++)
578 						for (group = 0;
579 						    dhgroup_p[group]; group++)
580 							conf_load_defaults_qm(
581 							    tr, qm_enc[enc],
582 							    qm_hash[hash],
583 							    dhgroup[group],
584 							    qm_enc_p[enc],
585 							    qm_hash_p[hash],
586 							    qm_ah_id[hash],
587 							    dhgroup_p[group],
588 							    proto, mode, pfs);
589 }
590 
591 void
592 conf_init(void)
593 {
594 	unsigned int i;
595 
596 	for (i = 0; i < sizeof conf_bindings / sizeof conf_bindings[0]; i++)
597 		LIST_INIT(&conf_bindings[i]);
598 	TAILQ_INIT(&conf_trans_queue);
599 	conf_reinit();
600 }
601 
602 /* Open the config file and map it into our address space, then parse it.  */
603 void
604 conf_reinit(void)
605 {
606 	struct conf_binding *cb = 0;
607 	int	 fd, trans;
608 	unsigned int i;
609 	size_t	 sz;
610 	char	*new_conf_addr = 0;
611 
612 	fd = monitor_open(conf_path, O_RDONLY, 0);
613 	if (fd == -1 || check_file_secrecy_fd(fd, conf_path, &sz) == -1) {
614 		if (fd == -1 && errno != ENOENT)
615 			log_error("conf_reinit: open(\"%s\", O_RDONLY, 0) "
616 			    "failed", conf_path);
617 		if (fd != -1)
618 			close(fd);
619 
620 		trans = conf_begin();
621 	} else {
622 		new_conf_addr = malloc(sz);
623 		if (!new_conf_addr) {
624 			log_error("conf_reinit: malloc (%lu) failed",
625 			    (unsigned long)sz);
626 			goto fail;
627 		}
628 		/* XXX I assume short reads won't happen here.  */
629 		if (read(fd, new_conf_addr, sz) != (int)sz) {
630 			log_error("conf_reinit: read (%d, %p, %lu) failed",
631 			    fd, new_conf_addr, (unsigned long)sz);
632 			goto fail;
633 		}
634 		close(fd);
635 
636 		trans = conf_begin();
637 
638 		/* XXX Should we not care about errors and rollback?  */
639 		conf_parse(trans, new_conf_addr, sz);
640 	}
641 
642 	/* Load default configuration values.  */
643 	conf_load_defaults(trans);
644 
645 	/* Free potential existing configuration.  */
646 	if (conf_addr) {
647 		for (i = 0; i < sizeof conf_bindings / sizeof conf_bindings[0];
648 		    i++)
649 			for (cb = LIST_FIRST(&conf_bindings[i]); cb;
650 			    cb = LIST_FIRST(&conf_bindings[i]))
651 				conf_remove_now(cb->section, cb->tag);
652 		free(conf_addr);
653 	}
654 	conf_end(trans, 1);
655 	conf_addr = new_conf_addr;
656 	return;
657 
658 fail:
659 	free(new_conf_addr);
660 	close(fd);
661 }
662 
663 /*
664  * Return the numeric value denoted by TAG in section SECTION or DEF
665  * if that tag does not exist.
666  */
667 int
668 conf_get_num(char *section, char *tag, int def)
669 {
670 	char	*value = conf_get_str(section, tag);
671 
672 	if (value)
673 		return atoi(value);
674 	return def;
675 }
676 
677 /*
678  * Return the socket endpoint address denoted by TAG in SECTION as a
679  * struct sockaddr.  It is the callers responsibility to deallocate
680  * this structure when it is finished with it.
681  */
682 struct sockaddr *
683 conf_get_address(char *section, char *tag)
684 {
685 	char	*value = conf_get_str(section, tag);
686 	struct sockaddr *sa;
687 
688 	if (!value)
689 		return 0;
690 	if (text2sockaddr(value, 0, &sa, 0, 0) == -1)
691 		return 0;
692 	return sa;
693 }
694 
695 /* Validate X according to the range denoted by TAG in section SECTION.  */
696 int
697 conf_match_num(char *section, char *tag, int x)
698 {
699 	char	*value = conf_get_str(section, tag);
700 	int	 val, min, max, n;
701 
702 	if (!value)
703 		return 0;
704 	n = sscanf(value, "%d,%d:%d", &val, &min, &max);
705 	switch (n) {
706 	case 1:
707 		LOG_DBG((LOG_MISC, 95, "conf_match_num: %s:%s %d==%d?",
708 		    section, tag, val, x));
709 		return x == val;
710 	case 3:
711 		LOG_DBG((LOG_MISC, 95, "conf_match_num: %s:%s %d<=%d<=%d?",
712 		    section, tag, min, x, max));
713 		return min <= x && max >= x;
714 	default:
715 		log_error("conf_match_num: section %s tag %s: invalid number "
716 		    "spec %s", section, tag, value);
717 	}
718 	return 0;
719 }
720 
721 /* Return the string value denoted by TAG in section SECTION.  */
722 char *
723 conf_get_str(char *section, char *tag)
724 {
725 	struct conf_binding *cb;
726 
727 	for (cb = LIST_FIRST(&conf_bindings[conf_hash(section)]); cb;
728 	    cb = LIST_NEXT(cb, link))
729 		if (strcasecmp(section, cb->section) == 0 &&
730 		    strcasecmp(tag, cb->tag) == 0) {
731 			LOG_DBG((LOG_MISC, 95, "conf_get_str: [%s]:%s->%s",
732 			    section, tag, cb->value));
733 			return cb->value;
734 		}
735 	LOG_DBG((LOG_MISC, 95,
736 	    "conf_get_str: configuration value not found [%s]:%s", section,
737 	    tag));
738 	return 0;
739 }
740 
741 /*
742  * Build a list of string values out of the comma separated value denoted by
743  * TAG in SECTION.
744  */
745 struct conf_list *
746 conf_get_list(char *section, char *tag)
747 {
748 	char	*liststr = 0, *p, *field, *t;
749 	struct conf_list *list = 0;
750 	struct conf_list_node *node = 0;
751 
752 	list = malloc(sizeof *list);
753 	if (!list)
754 		goto cleanup;
755 	TAILQ_INIT(&list->fields);
756 	list->cnt = 0;
757 	liststr = conf_get_str(section, tag);
758 	if (!liststr)
759 		goto cleanup;
760 	liststr = strdup(liststr);
761 	if (!liststr)
762 		goto cleanup;
763 	p = liststr;
764 	while ((field = strsep(&p, ",")) != NULL) {
765 		/* Skip leading whitespace */
766 		while (isspace((unsigned char)*field))
767 			field++;
768 		/* Skip trailing whitespace */
769 		if (p)
770 			for (t = p - 1; t > field && isspace((unsigned char)*t); t--)
771 				*t = '\0';
772 		if (*field == '\0') {
773 			log_print("conf_get_list: empty field, ignoring...");
774 			continue;
775 		}
776 		list->cnt++;
777 		node = calloc(1, sizeof *node);
778 		if (!node)
779 			goto cleanup;
780 		node->field = strdup(field);
781 		if (!node->field)
782 			goto cleanup;
783 		TAILQ_INSERT_TAIL(&list->fields, node, link);
784 	}
785 	free(liststr);
786 	return list;
787 
788 cleanup:
789 	free(node);
790 	if (list)
791 		conf_free_list(list);
792 	free(liststr);
793 	return 0;
794 }
795 
796 struct conf_list *
797 conf_get_tag_list(char *section)
798 {
799 	struct conf_list *list = 0;
800 	struct conf_list_node *node = 0;
801 	struct conf_binding *cb;
802 
803 	list = malloc(sizeof *list);
804 	if (!list)
805 		goto cleanup;
806 	TAILQ_INIT(&list->fields);
807 	list->cnt = 0;
808 	for (cb = LIST_FIRST(&conf_bindings[conf_hash(section)]); cb;
809 	    cb = LIST_NEXT(cb, link))
810 		if (strcasecmp(section, cb->section) == 0) {
811 			list->cnt++;
812 			node = calloc(1, sizeof *node);
813 			if (!node)
814 				goto cleanup;
815 			node->field = strdup(cb->tag);
816 			if (!node->field)
817 				goto cleanup;
818 			TAILQ_INSERT_TAIL(&list->fields, node, link);
819 		}
820 	return list;
821 
822 cleanup:
823 	free(node);
824 	if (list)
825 		conf_free_list(list);
826 	return 0;
827 }
828 
829 void
830 conf_free_list(struct conf_list *list)
831 {
832 	struct conf_list_node *node = TAILQ_FIRST(&list->fields);
833 
834 	while (node) {
835 		TAILQ_REMOVE(&list->fields, node, link);
836 		free(node->field);
837 		free(node);
838 		node = TAILQ_FIRST(&list->fields);
839 	}
840 	free(list);
841 }
842 
843 int
844 conf_begin(void)
845 {
846 	static int	seq = 0;
847 
848 	return ++seq;
849 }
850 
851 static int
852 conf_trans_node(int transaction, enum conf_op op, char *section, char *tag,
853     char *value, int override, int is_default)
854 {
855 	struct conf_trans *node;
856 
857 	node = calloc(1, sizeof *node);
858 	if (!node) {
859 		log_error("conf_trans_node: calloc (1, %lu) failed",
860 		    (unsigned long)sizeof *node);
861 		return 1;
862 	}
863 	node->trans = transaction;
864 	node->op = op;
865 	node->override = override;
866 	node->is_default = is_default;
867 	if (section && (node->section = strdup(section)) == NULL)
868 		goto fail;
869 	if (tag && (node->tag = strdup(tag)) == NULL)
870 		goto fail;
871 	if (value && (node->value = strdup(value)) == NULL)
872 		goto fail;
873 	TAILQ_INSERT_TAIL(&conf_trans_queue, node, link);
874 	return 0;
875 
876 fail:
877 	free(node->section);
878 	free(node->tag);
879 	free(node->value);
880 	free(node);
881 	return 1;
882 }
883 
884 /* Queue a set operation.  */
885 int
886 conf_set(int transaction, char *section, char *tag, char *value, int override,
887     int is_default)
888 {
889 	return conf_trans_node(transaction, CONF_SET, section, tag, value,
890 	    override, is_default);
891 }
892 
893 /* Queue a remove operation.  */
894 int
895 conf_remove(int transaction, char *section, char *tag)
896 {
897 	return conf_trans_node(transaction, CONF_REMOVE, section, tag, NULL,
898 	    0, 0);
899 }
900 
901 /* Queue a remove section operation.  */
902 int
903 conf_remove_section(int transaction, char *section)
904 {
905 	return conf_trans_node(transaction, CONF_REMOVE_SECTION, section, NULL,
906 	    NULL, 0, 0);
907 }
908 
909 /* Execute all queued operations for this transaction.  Cleanup.  */
910 int
911 conf_end(int transaction, int commit)
912 {
913 	struct conf_trans *node, *next;
914 
915 	for (node = TAILQ_FIRST(&conf_trans_queue); node; node = next) {
916 		next = TAILQ_NEXT(node, link);
917 		if (node->trans == transaction) {
918 			if (commit)
919 				switch (node->op) {
920 				case CONF_SET:
921 					conf_set_now(node->section, node->tag,
922 					    node->value, node->override,
923 					    node->is_default);
924 					break;
925 				case CONF_REMOVE:
926 					conf_remove_now(node->section,
927 					    node->tag);
928 					break;
929 				case CONF_REMOVE_SECTION:
930 					conf_remove_section_now(node->section);
931 					break;
932 				default:
933 					log_print("conf_end: unknown "
934 					    "operation: %d", node->op);
935 				}
936 			TAILQ_REMOVE(&conf_trans_queue, node, link);
937 			free(node->section);
938 			free(node->tag);
939 			free(node->value);
940 			free(node);
941 		}
942 	}
943 	return 0;
944 }
945 
946 /*
947  * Dump running configuration upon SIGUSR1.
948  * Configuration is "stored in reverse order", so reverse it again.
949  */
950 struct dumper {
951 	char	*s, *v;
952 	struct dumper *next;
953 };
954 
955 static void
956 conf_report_dump(struct dumper *node)
957 {
958 	/* Recursive, cleanup when we're done.  */
959 
960 	if (node->next)
961 		conf_report_dump(node->next);
962 
963 	if (node->v)
964 		LOG_DBG((LOG_REPORT, 0, "%s=\t%s", node->s, node->v));
965 	else if (node->s) {
966 		LOG_DBG((LOG_REPORT, 0, "%s", node->s));
967 		if (strlen(node->s) > 0)
968 			free(node->s);
969 	}
970 	free(node);
971 }
972 
973 void
974 conf_report(void)
975 {
976 	struct conf_binding *cb, *last = 0;
977 	unsigned int	i;
978 	char           *current_section = NULL;
979 	struct dumper  *dumper, *dnode;
980 
981 	dumper = dnode = calloc(1, sizeof *dumper);
982 	if (!dumper)
983 		goto mem_fail;
984 
985 	LOG_DBG((LOG_REPORT, 0, "conf_report: dumping running configuration"));
986 
987 	for (i = 0; i < sizeof conf_bindings / sizeof conf_bindings[0]; i++)
988 		for (cb = LIST_FIRST(&conf_bindings[i]); cb;
989 		    cb = LIST_NEXT(cb, link)) {
990 			if (!cb->is_default) {
991 				/* Dump this entry.  */
992 				if (!current_section || strcmp(cb->section,
993 				    current_section)) {
994 					if (current_section) {
995 						if (asprintf(&dnode->s, "[%s]",
996 						    current_section) == -1)
997 							goto mem_fail;
998 						dnode->next = calloc(1,
999 						    sizeof(struct dumper));
1000 						dnode = dnode->next;
1001 						if (!dnode)
1002 							goto mem_fail;
1003 
1004 						dnode->s = "";
1005 						dnode->next = calloc(1,
1006 						    sizeof(struct dumper));
1007 						dnode = dnode->next;
1008 						if (!dnode)
1009 							goto mem_fail;
1010 					}
1011 					current_section = cb->section;
1012 				}
1013 				dnode->s = cb->tag;
1014 				dnode->v = cb->value;
1015 				dnode->next = calloc(1, sizeof(struct dumper));
1016 				dnode = dnode->next;
1017 				if (!dnode)
1018 					goto mem_fail;
1019 				last = cb;
1020 			}
1021 		}
1022 
1023 	if (last)
1024 		if (asprintf(&dnode->s, "[%s]", last->section) == -1)
1025 			goto mem_fail;
1026 	conf_report_dump(dumper);
1027 
1028 	return;
1029 
1030 mem_fail:
1031 	log_error("conf_report: malloc/calloc failed");
1032 	while ((dnode = dumper) != 0) {
1033 		dumper = dumper->next;
1034 		free(dnode->s);
1035 		free(dnode);
1036 	}
1037 }
1038