PostgreSQL Source Code  git master
be-secure-common.c File Reference
#include "postgres.h"
#include <sys/stat.h>
#include <unistd.h>
#include "common/percentrepl.h"
#include "common/string.h"
#include "libpq/libpq.h"
#include "storage/fd.h"
Include dependency graph for be-secure-common.c:

Go to the source code of this file.

Functions

int run_ssl_passphrase_command (const char *prompt, bool is_server_start, char *buf, int size)
 
bool check_ssl_key_file_permissions (const char *ssl_key_file, bool isServerStart)
 

Function Documentation

◆ check_ssl_key_file_permissions()

bool check_ssl_key_file_permissions ( const char *  ssl_key_file,
bool  isServerStart 
)

Definition at line 110 of file be-secure-common.c.

111 {
112  int loglevel = isServerStart ? FATAL : LOG;
113  struct stat buf;
114 
115  if (stat(ssl_key_file, &buf) != 0)
116  {
117  ereport(loglevel,
119  errmsg("could not access private key file \"%s\": %m",
120  ssl_key_file)));
121  return false;
122  }
123 
124  /* Key file must be a regular file */
125  if (!S_ISREG(buf.st_mode))
126  {
127  ereport(loglevel,
128  (errcode(ERRCODE_CONFIG_FILE_ERROR),
129  errmsg("private key file \"%s\" is not a regular file",
130  ssl_key_file)));
131  return false;
132  }
133 
134  /*
135  * Refuse to load key files owned by users other than us or root, and
136  * require no public access to the key file. If the file is owned by us,
137  * require mode 0600 or less. If owned by root, require 0640 or less to
138  * allow read access through either our gid or a supplementary gid that
139  * allows us to read system-wide certificates.
140  *
141  * Note that roughly similar checks are performed in
142  * src/interfaces/libpq/fe-secure-openssl.c so any changes here may need
143  * to be made there as well. The environment is different though; this
144  * code can assume that we're not running as root.
145  *
146  * Ideally we would do similar permissions checks on Windows, but it is
147  * not clear how that would work since Unix-style permissions may not be
148  * available.
149  */
150 #if !defined(WIN32) && !defined(__CYGWIN__)
151  if (buf.st_uid != geteuid() && buf.st_uid != 0)
152  {
153  ereport(loglevel,
154  (errcode(ERRCODE_CONFIG_FILE_ERROR),
155  errmsg("private key file \"%s\" must be owned by the database user or root",
156  ssl_key_file)));
157  return false;
158  }
159 
160  if ((buf.st_uid == geteuid() && buf.st_mode & (S_IRWXG | S_IRWXO)) ||
161  (buf.st_uid == 0 && buf.st_mode & (S_IWGRP | S_IXGRP | S_IRWXO)))
162  {
163  ereport(loglevel,
164  (errcode(ERRCODE_CONFIG_FILE_ERROR),
165  errmsg("private key file \"%s\" has group or world access",
166  ssl_key_file),
167  errdetail("File must have permissions u=rw (0600) or less if owned by the database user, or permissions u=rw,g=r (0640) or less if owned by root.")));
168  return false;
169  }
170 #endif
171 
172  return true;
173 }
char * ssl_key_file
Definition: be-secure.c:40
int errcode_for_file_access(void)
Definition: elog.c:881
int errdetail(const char *fmt,...)
Definition: elog.c:1202
int errcode(int sqlerrcode)
Definition: elog.c:858
int errmsg(const char *fmt,...)
Definition: elog.c:1069
#define LOG
Definition: elog.h:31
#define FATAL
Definition: elog.h:41
#define ereport(elevel,...)
Definition: elog.h:149
static char * buf
Definition: pg_test_fsync.c:67
#define S_IXGRP
Definition: win32_port.h:309
#define stat
Definition: win32_port.h:286
#define S_IRWXG
Definition: win32_port.h:312
#define S_IRWXO
Definition: win32_port.h:324
#define S_ISREG(m)
Definition: win32_port.h:330
#define S_IWGRP
Definition: win32_port.h:306

References buf, ereport, errcode(), errcode_for_file_access(), errdetail(), errmsg(), FATAL, LOG, S_IRWXG, S_IRWXO, S_ISREG, S_IWGRP, S_IXGRP, ssl_key_file, and stat.

Referenced by be_tls_init().

◆ run_ssl_passphrase_command()

int run_ssl_passphrase_command ( const char *  prompt,
bool  is_server_start,
char *  buf,
int  size 
)

Definition at line 40 of file be-secure-common.c.

41 {
42  int loglevel = is_server_start ? ERROR : LOG;
43  char *command;
44  FILE *fh;
45  int pclose_rc;
46  size_t len = 0;
47 
48  Assert(prompt);
49  Assert(size > 0);
50  buf[0] = '\0';
51 
52  command = replace_percent_placeholders(ssl_passphrase_command, "ssl_passphrase_command", "p", prompt);
53 
54  fh = OpenPipeStream(command, "r");
55  if (fh == NULL)
56  {
57  ereport(loglevel,
59  errmsg("could not execute command \"%s\": %m",
60  command)));
61  goto error;
62  }
63 
64  if (!fgets(buf, size, fh))
65  {
66  if (ferror(fh))
67  {
68  explicit_bzero(buf, size);
69  ereport(loglevel,
71  errmsg("could not read from command \"%s\": %m",
72  command)));
73  goto error;
74  }
75  }
76 
77  pclose_rc = ClosePipeStream(fh);
78  if (pclose_rc == -1)
79  {
80  explicit_bzero(buf, size);
81  ereport(loglevel,
83  errmsg("could not close pipe to external command: %m")));
84  goto error;
85  }
86  else if (pclose_rc != 0)
87  {
88  explicit_bzero(buf, size);
89  ereport(loglevel,
91  errmsg("command \"%s\" failed",
92  command),
93  errdetail_internal("%s", wait_result_to_str(pclose_rc))));
94  goto error;
95  }
96 
97  /* strip trailing newline and carriage return */
99 
100 error:
101  pfree(command);
102  return len;
103 }
char * ssl_passphrase_command
Definition: be-secure.c:45
int errdetail_internal(const char *fmt,...)
Definition: elog.c:1229
#define ERROR
Definition: elog.h:39
int ClosePipeStream(FILE *file)
Definition: fd.c:2791
FILE * OpenPipeStream(const char *command, const char *mode)
Definition: fd.c:2486
Assert(fmt[strlen(fmt) - 1] !='\n')
void pfree(void *pointer)
Definition: mcxt.c:1436
char * replace_percent_placeholders(const char *instr, const char *param_name, const char *letters,...)
Definition: percentrepl.c:59
const void size_t len
void explicit_bzero(void *buf, size_t len)
static void error(void)
Definition: sql-dyntest.c:147
int pg_strip_crlf(char *str)
Definition: string.c:155
char * wait_result_to_str(int exitstatus)
Definition: wait_error.c:33

References Assert(), buf, ClosePipeStream(), ereport, errcode_for_file_access(), errdetail_internal(), errmsg(), ERROR, error(), explicit_bzero(), len, LOG, OpenPipeStream(), pfree(), pg_strip_crlf(), replace_percent_placeholders(), ssl_passphrase_command, and wait_result_to_str().

Referenced by ssl_external_passwd_cb().