Next: Introduction, Previous: (dir), Up: (dir) [Contents]
• Introduction: | ||
• Design Notes: | ||
• Configuration: | ||
• Implementation Notes: |
Next: Design Notes, Previous: Top, Up: Top [Contents]
Name comes from: Bruce’s / Better / Busy cron.
• Problems: | ||
• Requirements: | ||
• Design Choices: | ||
• vixie-cron Patches: |
Next: Requirements, Previous: Introduction, Up: Introduction [Contents]
• Problems with vixie-cron: | ||
• Problems with fcron: | ||
• Problems with anacron: | ||
• Problems with dcron: |
Next: Problems with fcron, Previous: Problems, Up: Problems [Contents]
Next: Problems with anacron, Previous: Problems with vixie-cron, Up: Problems [Contents]
/
) that happens to also be a username, fcron interprets
this word as the userid to run the job under, even for non-root users.
This causes problems for jobs like bin/something
when user
bin
exists.
MAILTO
can only contain a username, not a full email address.
Next: Problems with dcron, Previous: Problems with fcron, Up: Problems [Contents]
Anacron is only really useful for running jobs once a day or less frequently. From what I’ve seen, it’s good at what it does, just not useful at much else.
Previous: Problems with anacron, Up: Problems [Contents]
Next: Design Choices, Previous: Problems, Up: Introduction [Contents]
I am choosing to make a number of relatively unorthodox choices in order to avoid many of the security issues that have plagued vixie-cron and other related systems.
In particular, the system must support:
$MAILTO
if the job produces any output
(and possibly if the job exits non-zero)
This means that the system MUST support:
System crontab entries are additionally differentiated from normal ones by having a “username” column immediately preceding the command.
One of the biggest frustrations I have had with dealing with vixie-cron is its complete inability to deal with time jumps in an intelligent manner. In particular, when DST changes happen, jobs will either get skipped (when time jumps forward) or executed twice (when time jumps backwards). This is unacceptable.
In one of the target installations, we need to set up ulimits (limiting CPU time and memory) before executing commands. It would be easy enough to ulimit the entire daemon, but then the daemon itself would be vulnerable to getting killed when it has run for long enough. Our current setup is to run jobs through a global wrapper script, which can set any necessary limits (or anything else) and then execute the job.
Next: vixie-cron Patches, Previous: Requirements, Up: Introduction [Contents]
There are two basic methods of submitting crontab files:
1 Using a setuid submission agent was discarded to prevent the possibility of all the bugs that have plagued other setuid submission agents. The socket protocol is deliberately very simple, to make the submission agent foolproof.
By seperating job submission from job execution, exploiting the system to run arbitrary jobs as privileged users is made even harder. It also makes the design of those individual programs much simpler.
Previous: Design Choices, Up: Introduction [Contents]
This section lists all the non-trivial patches found for vixie-cron, what problem they appear to address, and (if appropriate) how bcron will avoid the same problem. The patches listed come from multiple sources, including the latest RPM (Fedora Core IIRC).
This patch modifies the crontab.5 man page to remove allowing ‘0’ for day of month or month numbers.
On some systems, signal handlers are single-shot. This patch modifies the SIGHUP handler to reactivate itself before it returns. bcron will use the bglibs signal functions, which use sigaction to create suitable handlers, where appropriate. bcron doesn’t use signals for any purpose.
This patch increases the maximum username length from 20 to 32, and modifies calls to strcpy to use strncpy to ensure all string copies are length bounded. bcron uses dynamically allocated strings to eliminate the possibility of buffer overflows.
This patch modifies the cron daemon to close stdin, stdout, and stderr on startup, and to reopen them as /dev/null. The bcron daemons run under supervise, and have no need of such handling.
Adds support for /etc/cron.d
Appears to modify crontab’s command-line handling such that no argument is interpreted as to read the crontab from standard input.
Documents several builtin macros to replace the first 5 fields. This macros consist of: ‘@reboot’, ‘@yearly’, ‘@annually’, ‘@monthly’, ‘@weekly’, ‘@daily’, ‘@midnight’, and ‘@hourly’. bcron will not, at least initially, support these macros.
Modifies crontab to use strncpy and snprintf when writing into length-bounded strings.
Patches the crontab man page to reference /etc/crontab.
Patches the crontab man page to point out that DST may cause jobs to be skipped or repeated.
Appears to modify how the cron daemon handles sending messages to syslog. bcron will log messages to stderr, avoiding syslog entirely.
Adds ‘-i’ to the list of arguments sent to sendmail (result is ‘-FCronDaemon -i -odi -oem’). Only useful for sendmail, but still needed.
Sanity checks the use of ‘-u’ against UID and/or root.
Does some sanity checking on mailto, and does a setuid before sending mail. bcron plays safe with mailto by putting it into a message header, and always drops root privileges before executing commands.
Return the SIGCHLD handler to its default state before executing commands.
More sprintf -> snprintf conversions.
Sync all the crontabs before sleeping to handle changes in the system time.
The previous patch created double execution issues with small backwards adjustments in the clock time.
Next: Configuration, Previous: Introduction, Up: Top [Contents]
• Fundamental Operations: | ||
• Programs: | ||
• Files: | ||
• Inter-Process Communication: |
Next: Programs, Previous: Design Notes, Up: Design Notes [Contents]
The following is a list of all the “core” operations that must be provided based on the requirements.
Strictly speaking, this is the only role that requires superuser privileges. Every other job should run as non-root.
Scan all the known jobs, determine which one needs to be executed next, and sleep until that time arrives.
Listen for connections on a socket and accept job data.
Read the submitted files and parse their contents into a structured format.
Check /etc/crontab and /etc/cron.d/* every minute for modifications. If any files are changed, added, or deleted, add the listed jobs. On systems with tightened security, these files may only be readable by ‘root’.
All jobs need to be saved to disk along with when they were last executed, in order to determine when they should be next executed.
Next: Files, Previous: Fundamental Operations, Up: Design Notes [Contents]
Top-level scheduler agent. Starts up as root, runs bcron-exec, and then drops root permanently.
Accepts jobs to run from bcron-sched on stdin, writes exit status back to stdout.
Manages the cron spool: receives jobs submitted from users, writes them to files in /var/spool/cron/crontabs, and notifies bcron-sched. This needs to be run from unixserver in order to securely determine the invoking UID. This program will optionally run the file through an external filter, specified on the command line, before installing the job.
Watches for changes to the system crontabs and notifies bcron-sched.
Next: Inter-Process Communication, Previous: Programs, Up: Design Notes [Contents]
• File Hierarchy: |
The above three items are read
Directory containing raw (text) crontab files.
Colon is chosen as a seperator because usernames cannot contain colons due to the format of /etc/passwd.
Directory containing pre-parsed (aka compiled) crontab files (Not yet implemented).
Temporary directory for files as they are written.
Named pipe used to tell bcron-sched to rescan the crontabs.
Previous: Files, Up: Design Notes [Contents]
All communication between programs is done in terms of either “packets” or “lines”. A packet is formatted as a netstring. That is, a packet of length N is encoded as the ASCII decimal value of N, ‘:’, N bytes of data, terminated by ‘,’. A line is simply a series of non-NUL bytes terminated by a NUL byte.
• Job Submission Protocol: | ||
• bcron-exec Protocol: |
Next: bcron-exec Protocol, Previous: Inter-Process Communication, Up: Inter-Process Communication [Contents]
Client sends a packet containing a single byte command followed by the username. If the command requires additional data, it is seperated from the username by a NUL byte. Server responds with a packet containing a response byte followed by a text message.
Client command codes are:
S
Submit a user crontab file. The content string contains the entire crontab file.
L
List the current crontab file. No content string.
R
Remove any previously submitted crontab file. No content string.
Y
List all system crontabs. No content string. This command is only available to users ‘root’ and ‘cron’.
Server response codes are:
K
Command was successful; file was parsed and accepted.
D
File could not be parsed.
Z
Temporary internal error.
Previous: Job Submission Protocol, Up: Inter-Process Communication [Contents]
Input packets contain a series of four or more NUL-terminated lines:
ID
username
command
environment
The environment is optional. If the environment contains
SHELL
, it replaces the default shell (‘/bin/sh’). If the
environment contains MAILTO
, it overrides the default mailing
address derived from the username.
Output packet:
ID
NUL
response code
text message
Output packets are sent asynchronously with respect to input packets.
Next: Implementation Notes, Previous: Design Notes, Up: Top [Contents]
• Environment Variables: |
Previous: Configuration, Up: Configuration [Contents]
BCRON_SPOOL
The base directory for bcron’s files. Defaults to /var/spool/cron.
BCRON_USER
The non-root user name to switch to for all processes that don’t require root privileges. Defaults to ‘cron’.
BCRON_MAXSIZE
The maximum size (in bytes) of a single user crontab. Defaults to unlimited.
BCRON_MAXJOBS
The maximum number of jobs in a single user crontab. Defaults to unlimited.
BCRON_SOCKET
The full path to the UNIX-domain socket used to submit crontabs. Defaults to /var/run/bcron-spool.
Previous: Configuration, Up: Top [Contents]
• Job Scheduler: |
Previous: Implementation Notes, Up: Implementation Notes [Contents]
Getting the job scheduler to work correctly for all possible cases consumed more time than all the other parts of the program put together, and this is all because of the problems that daylight savings causes.
The ultimate goal is this: given a linear timestamp, determine the next linear timestamp after which a job must be run. “Linear time” means the number of seconds since an epoch, in this case the UNIX epoch, midnight GMT January 1st, 1970. To contrast, “local time” means the time in terms of years, months, days, hours, minutes, and seconds in the current locale.
The time specification for jobs is composed of a set of local time bitmaps quantifying under what time conditions the job should run, assuming the conditions are evaluated every minute. The maximum scheduling resolution is one minute.
The effective algorithm is to step through every possible minute until the local time matches all the conditions in the time specification. This would result in an algorithm that could take up to 527,040-1 steps to complete, which is far too big a number to evaluate on every job. So, the algorithm optimizes away all impossible cases to make much larger time jumps. For example, if the job cannot be scheduled on the current day, skip over the entire day instead of just the current minute.
There are two ways I approached this task. First, do all calculations in terms of local time, and return the linear time at the last step. Second, do as many calculations as possible in terms of linear time, which can be returned directly. Both methods start with the same input data: The current linear time, and a set of bitmasks representing under what time conditions the job should run.
The first method was the most straightforward to get mostly working,
until I started to consider the implications of DST. During the
transition from normal time to DST, an hour is skipped. This is no
big deal, as mktime
will (or can be made to) compensate by
picking the next valid hour when presented with a “missing” hour.
On the other hand, there are many gotchas when dealing with the
duplicated hour. For example, hourly jobs need to get scheduled on
both, but daily jobs on only one.
The second method was harder to get working initially, as the math is more complicated. Despite doing many calculations in terms of linear time, this method still needs to keep track of the local time, in order to check against the bitmaps as well as to determine things like when the next day or month should start. This approach proved to be much easier to work with, once the initial math was done, and easier to make work correctly with regards to DST transitions.
There are actually others, but these two are the most simple and portable of the choices. See also http://cr.yp.to/docs/secureipc.html