]> git.saurik.com Git - apple/security.git/blame - ckcdiagnose/ckcdiagnose.sh
Security-57337.60.2.tar.gz
[apple/security.git] / ckcdiagnose / ckcdiagnose.sh
CommitLineData
5c19dc3a
A
1#!/bin/sh
2
3# Poor man's option parsing.
4# Replace with shift/case once more options come along.
5SHORT=0
6if [ "$1" == "-s" ]; then
7 SHORT=1
8fi
9
10PRODUCT_NAME=$(sw_vers -productName)
11PRODUCT_VERSION=$(sw_vers -buildVersion)
12HOSTNAME=$(hostname -s)
13NOW=$(date "+%Y%m%d%H%M%S")
14
15case $PRODUCT_NAME in
16 "Mac OS X")
17 PROD=OSX
18 secd=secd
19 secexec=security2
20 OUTPUTPARENT=/var/tmp
21 CRASHDIR=/Library/Logs/DiagnosticReports
e0e0d90e 22 CSDIR=$HOME/Library/Logs/CloudServices
5c19dc3a
A
23 SECLOGPATH=/var/log/module/com.apple.securityd
24 syd=/System/Library/PrivateFrameworks/SyncedDefaults.framework/Support/syncdefaultsd
25 kvsutil=/AppleInternal/Applications/kvsutil
26 ;;
27 *)
28 PROD=IOS
29 secd=securityd
30 secexec=security
31 OUTPUTPARENT=/Library/Logs/CrashReporter
32 CRASHDIR=/var/mobile/Library/Logs/CrashReporter
e0e0d90e 33 CSDIR=$CRASHDIR/DiagnosticLogs/CloudServices
5c19dc3a
A
34 SECLOGPATH=/var/mobile/Library/Logs/CrashReporter/DiagnosticLogs
35 syd=/System/Library/PrivateFrameworks/SyncedDefaults.framework/Support/syncdefaultsd
36 kvsutil=/usr/local/bin/kvsutil
37 ;;
38esac
39
40if (( ! $SHORT )); then
41 OUTPUTBASE=ckcdiagnose_${HOSTNAME}_${PRODUCT_VERSION}_${NOW}
42else
43 OUTPUTBASE=ckcdiagnose_snapshot_${HOSTNAME}_${PRODUCT_VERSION}_${NOW}
44fi
45OUTPUT=$OUTPUTPARENT/$OUTPUTBASE
46
47mkdir $OUTPUT
48
49if [ "$PROD" = "IOS" ]; then
50 while !(/usr/local/bin/profilectl cpstate | grep -Eq 'Unlocked|Disabled'); do
51 echo Please ensure that your device is unlocked and press Enter. >&2
52 read enter
53 done
54fi
55
56(
57echo Outputting to $OUTPUT
58set -x
59
60sw_vers > $OUTPUT/sw_vers.log
61
62$secexec sync -D > $OUTPUT/syncD.log
5c19dc3a 63$secexec sync -i > $OUTPUT/synci.log
e0e0d90e 64$secexec sync -L > $OUTPUT/syncL.log
5c19dc3a
A
65
66(( $SHORT )) || ([ -x $kvsutil ] && $kvsutil show com.apple.security.cloudkeychainproxy3 > $OUTPUT/kvsutil_show.txt 2>&1)
67
68if [ "$PROD" == "OSX" ]; then
69 $secexec item -g class=genp,nleg=1,svce="iCloud Keychain Account Meta-data" > $OUTPUT/ickcmetadata.log
70 $secexec item -g class=genp,nleg=1,acct=engine-state > $OUTPUT/engine-state.log
71elif [ "$PROD" == "IOS" ]; then
72 $secexec item -g class=genp,svce="iCloud Keychain Account Meta-data" > $OUTPUT/ickcmetadata.log
73 $secexec item -g class=genp,acct=engine-state > $OUTPUT/engine-state.log
74fi
75
76# In preparation, before getting any of the logs, query all classes,
77# just in order to excercise the decryption and corruption
78# verification for all items. This will log errors and simulated crashes
79# if any of the items should turn out corrupted.
80# The items are NOT saved in the diagnostic log, because they potentially
81# contain very private items.
82for class in genp inet cert keys; do
83 for sync in 0 1; do
84 for tomb in 0 1; do
85 echo class=${class},sync=${sync},tomb=${tomb}: >> $OUTPUT/keychain-state.log
86 ${secexec} item -q class=${class},sync=${sync},tomb=${tomb} | grep '^acct'|wc -l 2>&1 >> $OUTPUT/keychain-state.log
87 done
88 done
89done
90
91if (( ! $SHORT )); then
92 syslog -k Sender Seq syncdefaults > $OUTPUT/syslog_syncdefaults.log
93 syslog -k Sender Seq $secd > $OUTPUT/syslog_secd.log
94 syslog -k Sender Seq CloudKeychain > $OUTPUT/syslog_cloudkeychain.log
95fi
96
97(( $SHORT )) || (sbdtool status > $OUTPUT/sbdtool_status.log 2>&1)
e0e0d90e 98(( $SHORT )) || plutil -p $HOME/Library/SyncedPreferences/com.apple.sbd.plist > $OUTPUT/sbd_kvs.txt
5c19dc3a
A
99
100$syd status > $OUTPUT/syd_status.txt 2>&1
101$syd lastrequest > $OUTPUT/syd_lastrequest.txt 2>&1
102$syd serverlimits > $OUTPUT/syd_serverlimits.txt 2>&1
103
104# Compare kvsutil and sync -D state, shows if store diverged from on-device state.
105if (( ! $SHORT )); then
106 if [ -f $OUTPUT/kvsutil_show.txt ]; then
107 cat $OUTPUT/kvsutil_show.txt | grep -E '^ "?[o-]?ak.* = ' | sed -E 's/^ "?([^"]*)"? = \<.* (.*) (.*)\>.*$/\1 \2\3/g;s/^(.*) [0-9a-f]*([0-9a-f]{8})/\1 \2/g' | sort > $OUTPUT/kvs_keys.txt
108 cat $OUTPUT/syncD.log | grep -E 'contents = "?[o-]?ak' | sed -E 's/^.*contents = "?([^"]*)"?\} = .*bytes = .* ... [0-9a-f]+([0-9a-f]{8})\}/\1 \2/g' | sort > $OUTPUT/syncD_keys.txt
109 diff -u $OUTPUT/kvs_keys.txt $OUTPUT/syncD_keys.txt > $OUTPUT/kvs_syncD_diff.txt
110 fi
111fi
112
113if [ "$PROD" = "IOS" ]; then
114 cp /private/var/preferences/com.apple.security.cloudkeychainproxy3.keysToRegister.plist $OUTPUT/
115 cp /var/mobile/Library/SyncedPreferences/com.apple.security.cloudkeychainproxy3.plist $OUTPUT/
116else
117 cp ~/Library/Preferences/com.apple.security.cloudkeychainproxy3.keysToRegister.plist $OUTPUT/
118 cp ~/Library/SyncedPreferences/com.apple.security.cloudkeychainproxy3.plist $OUTPUT/
119fi
120
121if (( ! $SHORT )); then
122 cp $SECLOGPATH/security.log* $OUTPUT/
123
124 cp $CRASHDIR/*${secd}* $OUTPUT/
125 cp $CRASHDIR/*syncdefaults* $OUTPUT/
126 cp $CRASHDIR/*CloudKeychain* $OUTPUT/
127
e0e0d90e
A
128 (cd $CSDIR && for x in *_*.asl; do syslog -f "$x" > "$OUTPUT/${x%%.asl}.log"; done)
129
5c19dc3a
A
130 (cd $SECLOGPATH; gzcat -c -f security.log*) > $OUTPUT/security-complete.log
131
132 # potential problems
133 (cd $SECLOGPATH; gzcat -c security.log.*.gz; cat security.log.*Z) | grep -E -- 'Invalid date.|-26275|[cC]orrupt|[cC]rash|Public Key not available' > $OUTPUT/problems.log
134 (cd $SECLOGPATH; gzcat -c security.log.*.gz; cat security.log.*Z) | cut -d ' ' -f 6- | sort |uniq -c | sort -n > $OUTPUT/security-sorted.log
135fi
136
137) > $OUTPUT/ckcdiagnose.log 2>&1
138
139tar czf $OUTPUT.tgz -C $OUTPUTPARENT $OUTPUTBASE
140
141rm -r $OUTPUT
142
143if (( ! $SHORT )); then
144 echo
145 echo "The file containing the diagnostic information is "
146 echo " $OUTPUT.tgz"
147 echo 'Please attach it to a Radar in "Security / iCloud Keychain"'
148 echo
149
150 [ "$PROD" = "OSX" ] && open $OUTPUTPARENT
151else
152 echo $OUTPUT.tgz
153fi
154
155