Go to file
Omar Polo d1f84895f7 gmid.8: use a more on-point description 2023-10-20 15:46:42 +00:00
compat fix previous; check for getentropy only when arc4random is missing 2023-08-23 19:22:22 +00:00
contrib add -e to gencert usage() string 2023-08-29 09:36:36 +00:00
have resurrect landlock support 2023-08-23 20:18:59 +00:00
regress regress: change naming scheme for certs, add GENCERT_FLAGS knob 2023-08-29 09:30:28 +00:00
site some initial touches at the site 2023-10-18 19:29:55 +00:00
.cirrus.yml hopefully fix the macos ci 2023-06-23 22:40:58 +00:00
.dockerignore fix the dockerfile 2021-07-11 20:58:42 +00:00
.gitignore extend/sync .gitignore 2023-08-29 09:39:28 +00:00
ChangeLog sync changelog 2023-10-18 18:47:35 +00:00
LICENSE copyright years 2022-07-04 09:48:39 +00:00
Makefile `make lint' to check titan.1 too 2023-10-18 19:29:55 +00:00
README.md tweak readme 2023-08-23 20:34:06 +00:00
config.c ignore some errors from socket(2) 2023-08-25 09:40:09 +00:00
configure we're in public alpha right now! 2023-08-24 23:21:56 +00:00
crypto.c fix typo; the size computation is done using len, not ret 2023-08-29 09:18:55 +00:00
dirs.c don't set d_reclen 2022-07-07 08:54:26 +00:00
fcgi.c send all the params as per RFC3875 (CGI) and sync documentation 2023-08-18 12:40:10 +00:00
ge.c gemexp: add -R to generate an RSA (4096) key instead of an EC one (default) 2023-10-18 18:06:08 +00:00
gemexp.1 add a few Xr in SEE ALSO 2023-10-18 19:29:53 +00:00
gg.1 minor semplifications to some sentences 2023-10-19 21:33:38 +00:00
gg.c gg: prepend "Server says" to the reply code 2023-10-18 17:15:03 +00:00
gmid.8 gmid.8: use a more on-point description 2023-10-20 15:46:42 +00:00
gmid.c copyright++ 2023-10-18 17:15:47 +00:00
gmid.conf.5 grammar 2023-10-20 15:42:20 +00:00
gmid.h rework gencert(); make gemexp generate EC certs 2023-10-18 17:47:29 +00:00
iri.c more is*() unsigned char cast 2022-11-29 23:03:55 +00:00
iri.h split out iri.h from gmid.h 2023-07-22 13:49:07 +00:00
log.c add missing include of gmid.h 2023-06-06 11:57:33 +00:00
log.h switch to the more usual log.c 2023-06-06 11:46:40 +00:00
logger.c resurrect openlog() + tzset() in the logger 2023-08-23 20:30:39 +00:00
mime.c copyright years++ 2023-06-24 10:07:17 +00:00
parse.y plug a leak 2023-08-25 12:19:49 +00:00
proc.c rework check 2023-06-24 19:42:31 +00:00
proc.h reopen log files upon SIGUSR2 2023-07-24 09:00:19 +00:00
proxy.c copyright++ 2023-10-18 17:15:47 +00:00
puny.c remove not so useful starts_with() 2023-08-11 10:38:34 +00:00
sandbox.c resurrect landlock support 2023-08-23 20:18:59 +00:00
server.c log ip address and port when tls_handshake fails 2023-08-28 21:42:58 +00:00
titan.1 minor semplifications to some sentences 2023-10-19 21:33:38 +00:00
titan.c titan: clean up IRI/URI/URL mess; it's a IRI what we parse 2023-08-04 10:02:18 +00:00
utf8.c fmt 2021-10-18 10:05:55 +00:00
utils.c tweak certificate generation log messages 2023-10-18 18:07:28 +00:00

README.md

gmid

Warning The master branch is WIP: it's what gmid 2.0 will be, with breaking changes et al. Please use the latest release from the 1.8 branch for a stable and documented experience, thank you.

gmid is a full-featured Gemini server written with security in mind. It can serve static files, has optional FastCGI and proxying support, and a rich configuration syntax.

A few helper programs are shipped as part of gmid:

  • gg is a simple command-line Gemini client.

  • gemexp is a stripped-down config-less version of gmid to quickly serve a directory from the command line.

  • titan is a command-line titan client.

Internationalisation (IRIs, UNICODE, punycode, all that stuff)

Even thought the current Gemini specification doesn't mention anything in this regard, I do think these are important things and so I tried to implement them in the most user-friendly way I could think of.

For starters, gmid has full support for IRI (RFC3987 — Internationalized Resource Identifiers). IRIs are a superset of URIs, so there aren't incompatibilities with URI-only clients.

There is full support also for punycode. In theory, the user doesn't even need to know that punycode is a thing. The hostname in the configuration file can (and must be) in the decoded form (e.g. naïve and not xn--nave-6pa), gmid will do the rest.

The only missing piece is UNICODE normalisation of the IRI path: gmid doesn't do that (yet).

Configuration

gmid has a rich configuration file, heavily inspired by OpenBSD' httpd(8), with every detail carefully documented in the manpage. Here's a minimal example of a config file:

server "example.com" {
	listen on * port 1965
	cert "/path/to/cert.pem"
	key  "/path/to/key.pem"
	root "/var/gemini/example.com"
}

and a slightly more complex one

cert_root = "/path/to/keys"

server "example.com" {
	listen on * port 1965

	alias "foobar.com"

	cert $cert_root "/example.com.crt"
	key  $cert_root "/example.com.pem"
	root "/var/gemini/example.com"

	# lang for text/gemini files
	lang "en"

	# only for locations that matches /files/*
	location "/files/*" {
		# generate directory listings
		auto index on
	}

	location "/repo/*" {
		# change the index file name
		index "README.gmi"
		lang "it"
	}
}

Building

gmid depends on libevent2, OpenSSL/LibreSSL and libtls (provided either by LibreSSL or libretls). At build time, yacc (or GNU bison) is also needed.

The build is as simple as

$ ./configure
$ make

If the configure scripts fails to pick up something, please open an issue or notify me via email.

To install execute:

# make install

Please keep in mind that the master branch, from time to time, may be accidentally broken on some platforms. gmid is developed primarily on OpenBSD/amd64 and commits on the master branch don't get always tested in other OSes. Before tagging a release however, a comprehensive testing on various platform is done to ensure that everything is working as intended.

Testing

Execute

$ make regress

to start the suite. Keep in mind that the regression tests needs to create a few file inside the regress directory and bind the 10965 port.

Contributing

Any form of contribution is welcome, not only patches or bug reports. If you have a sample configuration for some specific use-case, a script or anything that could be useful to others, consider adding it to the contrib directory.

Architecture/Security considerations

The internal architecture was revisited for the 2.0 release. For previous releases, please refer to previous revision of this file.

gmid has a privsep design, where the operations done by the daemon are splitted into multiple processes:

  • main: the main process is the only one that keeps the original privileges. It opens the TLS certificates on the behalf of the server and crypto processes and reloads the configuration upon SIGHUP.

  • logger: handles the logging with syslog and/or local files.

  • server: listen on the binded ports and serves the request. This also include speaking FastCGI and proxying requests.

  • crypto: holds the TLS private keys to avoid a compromised server process to disclose them.