1270 lines
32 KiB
C
1270 lines
32 KiB
C
/*
|
|
* CU sudo version 1.5.8 (based on Root Group sudo version 1.1)
|
|
* Copyright (c) 1994,1996,1998,1999 Todd C. Miller <Todd.Miller@courtesan.com>
|
|
*
|
|
* This software comes with no waranty whatsoever, use at your own risk.
|
|
*
|
|
* Please send bugs, changes, problems to sudo-bugs@courtesan.com
|
|
*
|
|
*/
|
|
|
|
/*
|
|
* sudo version 1.1 allows users to execute commands as root
|
|
* Copyright (C) 1991 The Root Group, Inc.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 1, or (at your option)
|
|
* any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*
|
|
*******************************************************************
|
|
*
|
|
* check.c
|
|
*
|
|
* check_user() only returns if the user's timestamp file
|
|
* is current or if they enter a correct password.
|
|
*
|
|
* Jeff Nieusma Thu Mar 21 22:39:07 MST 1991
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#include <stdio.h>
|
|
#ifdef STDC_HEADERS
|
|
#include <stdlib.h>
|
|
#endif /* STDC_HEADERS */
|
|
#ifdef HAVE_UNISTD_H
|
|
#include <unistd.h>
|
|
#endif /* HAVE_UNISTD_H */
|
|
#ifdef HAVE_STRING_H
|
|
#include <string.h>
|
|
#endif /* HAVE_STRING_H */
|
|
#ifdef HAVE_STRINGS_H
|
|
#include <strings.h>
|
|
#endif /* HAVE_STRINGS_H */
|
|
#include <fcntl.h>
|
|
#include <time.h>
|
|
#include <sys/param.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/file.h>
|
|
#include <netinet/in.h>
|
|
#include <pwd.h>
|
|
#include <grp.h>
|
|
#ifdef HAVE_KERB4
|
|
# include <krb.h>
|
|
#endif /* HAVE_KERB4 */
|
|
#ifdef HAVE_KERB5
|
|
# include <krb5.h>
|
|
#endif /* HAVE_KERB5 */
|
|
#ifdef HAVE_PAM
|
|
# include <security/pam_appl.h>
|
|
# include <security/pam_misc.h>
|
|
#endif /* HAVE_PAM */
|
|
#ifdef HAVE_AFS
|
|
# include <afs/stds.h>
|
|
# include <afs/kautils.h>
|
|
#endif /* HAVE_AFS */
|
|
#ifdef HAVE_SECURID
|
|
# include <sdi_athd.h>
|
|
# include <sdconf.h>
|
|
# include <sdacmvls.h>
|
|
#endif /* HAVE_SECURID */
|
|
#ifdef HAVE_SKEY
|
|
# include <skey.h>
|
|
#endif /* HAVE_SKEY */
|
|
#ifdef HAVE_OPIE
|
|
# include <opie.h>
|
|
#endif /* HAVE_OPIE */
|
|
#ifdef HAVE_AUTHSRV
|
|
# include <firewall.h>
|
|
#endif
|
|
#ifdef HAVE_UTIME
|
|
# ifdef HAVE_UTIME_H
|
|
# include <utime.h>
|
|
# endif /* HAVE_UTIME_H */
|
|
#else
|
|
# include "emul/utime.h"
|
|
#endif /* HAVE_UTIME */
|
|
|
|
#include "sudo.h"
|
|
#include "insults.h"
|
|
#include "version.h"
|
|
|
|
#ifndef lint
|
|
static const char rcsid[] = "$Sudo$";
|
|
#endif /* lint */
|
|
|
|
/*
|
|
* Prototypes for local functions
|
|
*/
|
|
static int check_timestamp __P((void));
|
|
static void check_passwd __P((void));
|
|
static int touch __P((char *));
|
|
static void update_timestamp __P((void));
|
|
static void reminder __P((void));
|
|
static char *expand_prompt __P((char *, char *, char *));
|
|
#ifdef HAVE_KERB4
|
|
static int sudo_krb_validate_user __P((struct passwd *, char *));
|
|
#endif /* HAVE_KERB4 */
|
|
#ifdef HAVE_KERB5
|
|
static int sudo_krb5_validate_user __P((struct passwd *, char *));
|
|
static int verify_krb_v5_tgt __P((krb5_ccache));
|
|
#endif /* HAVE_KERB5 */
|
|
#ifdef HAVE_PAM
|
|
static void pam_attempt_auth __P((void));
|
|
#endif /* HAVE_PAM */
|
|
#ifdef HAVE_SKEY
|
|
static char *sudo_skeyprompt __P((struct skey *, char *));
|
|
#endif /* HAVE_SKEY */
|
|
#ifdef HAVE_OPIE
|
|
static char *sudo_opieprompt __P((struct opie *, char *));
|
|
#endif /* HAVE_OPIE */
|
|
int user_is_exempt __P((void));
|
|
|
|
/*
|
|
* Globals
|
|
*/
|
|
static int timedir_is_good;
|
|
static char timestampfile[MAXPATHLEN];
|
|
#ifdef HAVE_SECURID
|
|
union config_record configure;
|
|
#endif /* HAVE_SECURID */
|
|
#ifdef HAVE_SKEY
|
|
struct skey skey;
|
|
#endif
|
|
#ifdef HAVE_OPIE
|
|
struct opie opie;
|
|
#endif
|
|
#ifdef HAVE_KERB5
|
|
extern krb5_context sudo_context;
|
|
extern char *realm;
|
|
extern int xrealm;
|
|
#endif /* HAVE_KERB5 */
|
|
|
|
|
|
|
|
/********************************************************************
|
|
*
|
|
* check_user()
|
|
*
|
|
* This function only returns if the user can successfully
|
|
* verify who s/he is.
|
|
*/
|
|
|
|
void check_user()
|
|
{
|
|
register int rtn;
|
|
mode_t oldmask;
|
|
|
|
if (user_is_exempt()) /* some users don't need to enter a passwd */
|
|
return;
|
|
|
|
oldmask = umask(077); /* make sure the timestamp files are private */
|
|
|
|
rtn = check_timestamp();
|
|
if (rtn && user_uid) { /* if timestamp is not current... */
|
|
#ifndef NO_MESSAGE
|
|
if (rtn == 2)
|
|
reminder(); /* do the reminder if ticket file is new */
|
|
#endif /* NO_MESSAGE */
|
|
|
|
/* expand any escapes in the prompt */
|
|
prompt = expand_prompt(prompt, user_name, shost);
|
|
|
|
#ifdef HAVE_SIA
|
|
sia_attempt_auth();
|
|
#elif HAVE_PAM
|
|
pam_attempt_auth();
|
|
#else /* !HAVE_SIA && !HAVE_PAM */
|
|
check_passwd();
|
|
#endif /* HAVE_SIA */
|
|
}
|
|
|
|
update_timestamp();
|
|
(void) umask(oldmask); /* want a real umask to exec() the command */
|
|
|
|
}
|
|
|
|
|
|
|
|
/********************************************************************
|
|
*
|
|
* user_is_exempt()
|
|
*
|
|
* this function checks the user is exempt from supplying a password.
|
|
*/
|
|
|
|
int user_is_exempt()
|
|
{
|
|
#ifdef EXEMPTGROUP
|
|
struct group *grp;
|
|
char **gr_mem;
|
|
|
|
if ((grp = getgrnam(EXEMPTGROUP)) == NULL)
|
|
return(FALSE);
|
|
|
|
if (getgid() == grp->gr_gid)
|
|
return(TRUE);
|
|
|
|
for (gr_mem = grp->gr_mem; *gr_mem; gr_mem++) {
|
|
if (strcmp(user_name, *gr_mem) == 0)
|
|
return(TRUE);
|
|
}
|
|
|
|
return(FALSE);
|
|
#else
|
|
return(FALSE);
|
|
#endif
|
|
}
|
|
|
|
|
|
|
|
/********************************************************************
|
|
*
|
|
* check_timestamp()
|
|
*
|
|
* this function checks the timestamp file. If it is within
|
|
* TIMEOUT minutes, no password will be required
|
|
*/
|
|
|
|
static int check_timestamp()
|
|
{
|
|
register char *p;
|
|
struct stat statbuf;
|
|
register int timestamp_is_old = -1;
|
|
time_t now;
|
|
|
|
#ifdef USE_TTY_TICKETS
|
|
if (p = strrchr(tty, '/'))
|
|
p++;
|
|
else
|
|
p = tty;
|
|
|
|
if (sizeof(_PATH_SUDO_TIMEDIR) + strlen(user_name) + strlen(p) + 2 >
|
|
sizeof(timestampfile)) {
|
|
(void) fprintf(stderr, "%s: path too long: %s/%s:%s\n", Argv[0],
|
|
_PATH_SUDO_TIMEDIR, user_name, p);
|
|
exit(1);
|
|
}
|
|
(void) sprintf(timestampfile, "%s/%s:%s", _PATH_SUDO_TIMEDIR, user_name, p);
|
|
#else
|
|
if (sizeof(_PATH_SUDO_TIMEDIR) + strlen(user_name) + 1 >
|
|
sizeof(timestampfile)) {
|
|
(void) fprintf(stderr, "%s: path too long: %s/%s\n", Argv[0],
|
|
_PATH_SUDO_TIMEDIR, user_name);
|
|
exit(1);
|
|
}
|
|
(void) sprintf(timestampfile, "%s/%s", _PATH_SUDO_TIMEDIR, user_name);
|
|
#endif /* USE_TTY_TICKETS */
|
|
|
|
timedir_is_good = 1; /* now there's an assumption for ya... */
|
|
|
|
/* become root */
|
|
set_perms(PERM_ROOT, 0);
|
|
|
|
/*
|
|
* walk through the path one directory at a time
|
|
*/
|
|
for (p = timestampfile + 1; (p = strchr(p, '/')); *p++ = '/') {
|
|
*p = '\0';
|
|
if (stat(timestampfile, &statbuf) < 0) {
|
|
if (strcmp(timestampfile, _PATH_SUDO_TIMEDIR))
|
|
(void) fprintf(stderr, "Cannot stat() %s\n", timestampfile);
|
|
timedir_is_good = 0;
|
|
*p = '/';
|
|
break;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* if all the directories are stat()able
|
|
*/
|
|
if (timedir_is_good) {
|
|
/*
|
|
* last component in _PATH_SUDO_TIMEDIR must be owned by root
|
|
* and mode 0700 or we ignore the timestamps in it.
|
|
*/
|
|
if (statbuf.st_uid != 0 || (statbuf.st_mode & 0000077)) {
|
|
timedir_is_good = 0;
|
|
timestamp_is_old = 2;
|
|
log_error(BAD_STAMPDIR);
|
|
inform_user(BAD_STAMPDIR);
|
|
} else if (stat(timestampfile, &statbuf)) {
|
|
/* timestamp file does not exist? */
|
|
timestamp_is_old = 2; /* return (2) */
|
|
} else {
|
|
/* check the time against the timestamp file */
|
|
now = time((time_t *) NULL);
|
|
if (TIMEOUT && now - statbuf.st_mtime < 60 * TIMEOUT) {
|
|
/* check for bogus time on the stampfile */
|
|
if (statbuf.st_mtime > now + 60 * TIMEOUT * 2) {
|
|
timestamp_is_old = 2; /* bogus time value */
|
|
log_error(BAD_STAMPFILE);
|
|
inform_user(BAD_STAMPFILE);
|
|
remove_timestamp();
|
|
} else {
|
|
timestamp_is_old = 0; /* time value is reasonable */
|
|
}
|
|
} else {
|
|
timestamp_is_old = 1; /* else make 'em enter password */
|
|
}
|
|
}
|
|
}
|
|
/*
|
|
* there was a problem stat()ing a directory
|
|
*/
|
|
else {
|
|
timestamp_is_old = 2; /* user has to enter password + reminder */
|
|
/* make the TIMEDIR directory */
|
|
if (mkdir(_PATH_SUDO_TIMEDIR, S_IRWXU)) {
|
|
perror("check_timestamp: mkdir");
|
|
timedir_is_good = 0;
|
|
} else {
|
|
timedir_is_good = 1; /* _PATH_SUDO_TIMEDIR now exists */
|
|
}
|
|
}
|
|
|
|
/* relinquish root */
|
|
set_perms(PERM_USER, 0);
|
|
|
|
return (timestamp_is_old);
|
|
}
|
|
|
|
|
|
|
|
/********************************************************************
|
|
*
|
|
* touch()
|
|
*
|
|
* This function updates the access and modify times on a file
|
|
* via utime(2).
|
|
*/
|
|
|
|
static int touch(file)
|
|
char *file;
|
|
{
|
|
#if defined(HAVE_UTIME) && !defined(HAVE_UTIME_NULL)
|
|
#ifdef HAVE_UTIME_POSIX
|
|
#define UTP (&ut)
|
|
struct utimbuf ut;
|
|
|
|
ut.actime = ut.modtime = time(NULL);
|
|
#else
|
|
#define UTP (ut)
|
|
/* old BSD <= 4.3 has no struct utimbuf */
|
|
time_t ut[2];
|
|
|
|
ut[0] = ut[1] = time(NULL);
|
|
#endif /* HAVE_UTIME_POSIX */
|
|
#else
|
|
#define UTP NULL
|
|
#endif /* HAVE_UTIME && !HAVE_UTIME_NULL */
|
|
|
|
return(utime(file, UTP));
|
|
}
|
|
#undef UTP
|
|
|
|
|
|
|
|
/********************************************************************
|
|
*
|
|
* update_timestamp()
|
|
*
|
|
* This function changes the timestamp to "now"
|
|
*/
|
|
|
|
static void update_timestamp()
|
|
{
|
|
if (timedir_is_good) {
|
|
/* become root */
|
|
set_perms(PERM_ROOT, 0);
|
|
|
|
if (touch(timestampfile) < 0) {
|
|
int fd = open(timestampfile, O_WRONLY | O_CREAT | O_TRUNC, 0600);
|
|
|
|
if (fd < 0)
|
|
perror("update_timestamp: open");
|
|
else
|
|
close(fd);
|
|
}
|
|
|
|
/* relinquish root */
|
|
set_perms(PERM_USER, 0);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
/********************************************************************
|
|
*
|
|
* remove_timestamp()
|
|
*
|
|
* This function removes the timestamp ticket file
|
|
*/
|
|
|
|
void remove_timestamp()
|
|
{
|
|
#ifdef USE_TTY_TICKETS
|
|
char *p;
|
|
|
|
if (p = strrchr(tty, '/'))
|
|
p++;
|
|
else
|
|
p = tty;
|
|
|
|
if (sizeof(_PATH_SUDO_TIMEDIR) + strlen(user_name) + strlen(p) + 2 >
|
|
sizeof(timestampfile)) {
|
|
(void) fprintf(stderr, "%s: path too long: %s/%s:%s\n", Argv[0],
|
|
_PATH_SUDO_TIMEDIR, user_name, p);
|
|
exit(1);
|
|
}
|
|
(void) sprintf(timestampfile, "%s/%s:%s", _PATH_SUDO_TIMEDIR, user_name, p);
|
|
#else
|
|
if (sizeof(_PATH_SUDO_TIMEDIR) + strlen(user_name) + 1 >
|
|
sizeof(timestampfile)) {
|
|
(void) fprintf(stderr, "%s: path too long: %s/%s\n", Argv[0],
|
|
_PATH_SUDO_TIMEDIR, user_name);
|
|
exit(1);
|
|
}
|
|
(void) sprintf(timestampfile, "%s/%s", _PATH_SUDO_TIMEDIR, user_name);
|
|
#endif /* USE_TTY_TICKETS */
|
|
|
|
/* become root */
|
|
set_perms(PERM_ROOT, 0);
|
|
|
|
/* remove the ticket file */
|
|
(void) unlink(timestampfile);
|
|
|
|
/* relinquish root */
|
|
set_perms(PERM_USER, 0);
|
|
}
|
|
|
|
|
|
|
|
/********************************************************************
|
|
*
|
|
* check_passwd()
|
|
*
|
|
* This function grabs the user's password and checks with the password
|
|
* in /etc/passwd (or uses other specified authentication method).
|
|
*/
|
|
|
|
#ifdef HAVE_SECURID
|
|
static void check_passwd()
|
|
{
|
|
struct SD_CLIENT sd_dat, *sd; /* SecurID data block */
|
|
register int counter = TRIES_FOR_PASSWORD;
|
|
|
|
(void) memset((VOID *)&sd_dat, 0, sizeof(sd_dat));
|
|
sd = &sd_dat;
|
|
|
|
/* Initialize SecurID. */
|
|
set_perms(PERM_ROOT, 0);
|
|
creadcfg();
|
|
if (sd_init(sd) != 0) {
|
|
(void) fprintf(stderr, "%s: Cannot contact SecurID server\n", Argv[0]);
|
|
exit(1);
|
|
}
|
|
|
|
/*
|
|
* you get TRIES_FOR_PASSWORD times to guess your password
|
|
*/
|
|
while (counter > 0) {
|
|
if (sd_auth(sd) == ACM_OK) {
|
|
set_perms(PERM_USER, 0);
|
|
return;
|
|
}
|
|
|
|
--counter; /* otherwise, try again */
|
|
pass_warn(stderr);
|
|
}
|
|
set_perms(PERM_USER, 0);
|
|
|
|
if (counter > 0) {
|
|
log_error(PASSWORD_NOT_CORRECT);
|
|
inform_user(PASSWORD_NOT_CORRECT);
|
|
} else {
|
|
log_error(PASSWORDS_NOT_CORRECT);
|
|
inform_user(PASSWORDS_NOT_CORRECT);
|
|
}
|
|
|
|
exit(1);
|
|
}
|
|
#else /* !HAVE_SECURID */
|
|
#ifdef HAVE_AUTHSRV
|
|
static void check_passwd()
|
|
{
|
|
char *pass; /* this is what gets entered */
|
|
Cfg *confp;
|
|
|
|
char cbuf[128];
|
|
char ubuf[128], buf[128];
|
|
register int counter = TRIES_FOR_PASSWORD;
|
|
|
|
if((confp = cfg_read("sudo")) == (Cfg *)-1) {
|
|
fprintf(stderr,"Cannot read config.\n");
|
|
exit(1);
|
|
}
|
|
|
|
|
|
/* Initialize Auth Client */
|
|
auth_open(confp);
|
|
|
|
/* get welcome message from auth server */
|
|
if(auth_recv(buf,sizeof(buf))) {
|
|
sprintf(buf,"Lost connection to server");
|
|
fprintf(stderr,"%s\n",buf);
|
|
exit(1);
|
|
}
|
|
|
|
if(strncmp(buf,"Authsrv ready",13)) {
|
|
fprintf(stderr,"Auth server error %s\n",buf);
|
|
auth_close();
|
|
exit(1);
|
|
}
|
|
/*
|
|
* you get TRIES_FOR_PASSWORD times to guess your password
|
|
*/
|
|
while (counter > 0) {
|
|
|
|
sprintf(cbuf,"authorize %s sudo",user_name);
|
|
|
|
auth_send(cbuf);
|
|
auth_recv(cbuf,sizeof(cbuf));
|
|
|
|
if(!strncmp(cbuf,"challenge ",10)) {
|
|
sprintf(buf,"Challenge \"%s\": ",&cbuf[10]);
|
|
|
|
# ifdef USE_GETPASS
|
|
pass = (char *) getpass(buf);
|
|
# else
|
|
pass = tgetpass(buf, PASSWORD_TIMEOUT * 60);
|
|
# endif /* USE_GETPASS */
|
|
|
|
}
|
|
|
|
else if(!strncmp(cbuf,"password",8)) {
|
|
# ifdef USE_GETPASS
|
|
pass = (char *) getpass(cbuf);
|
|
# else
|
|
pass = tgetpass(cbuf, PASSWORD_TIMEOUT * 60);
|
|
# endif /* USE_GETPASS */
|
|
}
|
|
else {
|
|
fprintf(stderr,"Server sent %s\n",cbuf);
|
|
auth_close();
|
|
exit(1);
|
|
}
|
|
|
|
sprintf(cbuf,"response '%s'",pass);
|
|
auth_send(cbuf);
|
|
auth_recv(cbuf,sizeof(cbuf));
|
|
|
|
if(!strncmp(cbuf,"ok",2)) {
|
|
/* Success */
|
|
/*inform_user(cbuf);*/
|
|
set_perms(PERM_USER, 0);
|
|
auth_close();
|
|
return;
|
|
}
|
|
else {
|
|
fprintf(stderr,"Server returned %s\n",cbuf);
|
|
}
|
|
pass_warn(stderr);
|
|
--counter; /* otherwise, try again */
|
|
}
|
|
|
|
set_perms(PERM_USER, 0);
|
|
|
|
auth_close();
|
|
|
|
if (counter > 0) {
|
|
log_error(PASSWORD_NOT_CORRECT);
|
|
inform_user(PASSWORD_NOT_CORRECT);
|
|
} else {
|
|
log_error(PASSWORDS_NOT_CORRECT);
|
|
inform_user(PASSWORDS_NOT_CORRECT);
|
|
}
|
|
exit(1);
|
|
}
|
|
#else /* !HAVE_AUTHSRV */
|
|
|
|
static void check_passwd()
|
|
{
|
|
char *pass; /* this is what gets entered */
|
|
int counter = TRIES_FOR_PASSWORD;
|
|
#if defined(HAVE_KERB4) && defined(USE_GETPASS)
|
|
char kpass[_PASSWD_LEN + 1];
|
|
#endif /* HAVE_KERB4 && USE_GETPASS */
|
|
#ifdef HAVE_AUTHENTICATE
|
|
char *message;
|
|
int reenter;
|
|
#endif /* HAVE_AUTHENTICATE */
|
|
|
|
#ifdef HAVE_SKEY
|
|
(void) memset((VOID *)&skey, 0, sizeof(skey));
|
|
#endif /* HAVE_SKEY */
|
|
#ifdef HAVE_OPIE
|
|
(void) memset((VOID *)&opie, 0, sizeof(opie));
|
|
#endif /* HAVE_OPIE */
|
|
|
|
/*
|
|
* you get TRIES_FOR_PASSWORD times to guess your password
|
|
*/
|
|
while (counter > 0) {
|
|
|
|
#ifdef HAVE_AUTHENTICATE
|
|
/* use AIX authenticate() function */
|
|
# ifdef USE_GETPASS
|
|
pass = (char *) getpass(prompt);
|
|
# else
|
|
pass = tgetpass(prompt, PASSWORD_TIMEOUT * 60);
|
|
# endif /* USE_GETPASS */
|
|
reenter = 1;
|
|
if (authenticate(user_name, pass, &reenter, &message) == 0)
|
|
return; /* valid password */
|
|
#else /* HAVE_AUTHENTICATE */
|
|
# ifdef HAVE_SKEY
|
|
/* rewrite the prompt if using s/key since the challenge can change */
|
|
set_perms(PERM_ROOT, 0);
|
|
prompt = sudo_skeyprompt(&skey, prompt);
|
|
set_perms(PERM_USER, 0);
|
|
# endif /* HAVE_SKEY */
|
|
# ifdef HAVE_OPIE
|
|
/* rewrite the prompt if using OPIE since the challenge can change */
|
|
set_perms(PERM_ROOT, 0);
|
|
prompt = sudo_opieprompt(&opie, prompt);
|
|
set_perms(PERM_USER, 0);
|
|
# endif /* HAVE_OPIE */
|
|
|
|
/* get a password from the user */
|
|
# ifdef USE_GETPASS
|
|
# ifdef HAVE_KERB4
|
|
(void) des_read_pw_string(kpass, sizeof(kpass) - 1, prompt, 0);
|
|
pass = kpass;
|
|
# else
|
|
pass = (char *) getpass(prompt);
|
|
# endif /* HAVE_KERB4 */
|
|
# else
|
|
pass = tgetpass(prompt, PASSWORD_TIMEOUT * 60);
|
|
# endif /* USE_GETPASS */
|
|
|
|
/* Exit loop on nil password */
|
|
if (!pass || *pass == '\0') {
|
|
if (counter == TRIES_FOR_PASSWORD)
|
|
exit(1);
|
|
else
|
|
break;
|
|
}
|
|
|
|
# ifdef HAVE_SKEY
|
|
/* Only check s/key db if the user exists there */
|
|
if (skey.keyfile) {
|
|
set_perms(PERM_ROOT, 0);
|
|
if (skeyverify(&skey, pass) == 0) {
|
|
set_perms(PERM_USER, 0);
|
|
return; /* if the key is correct return() */
|
|
}
|
|
set_perms(PERM_USER, 0);
|
|
}
|
|
# endif /* HAVE_SKEY */
|
|
# ifdef HAVE_OPIE
|
|
/* Only check OPIE db if the user exists there */
|
|
if (opie.opie_flags) {
|
|
set_perms(PERM_ROOT, 0);
|
|
if (opieverify(&opie, pass) == 0) {
|
|
set_perms(PERM_USER, 0);
|
|
return; /* if the key is correct return() */
|
|
}
|
|
set_perms(PERM_USER, 0);
|
|
}
|
|
# endif /* HAVE_OPIE */
|
|
# if !defined(OTP_ONLY) || (!defined(HAVE_SKEY) && !defined(HAVE_OPIE))
|
|
/*
|
|
* If we use shadow passwords with a different crypt(3)
|
|
* check that here, else use standard crypt(3).
|
|
*/
|
|
# ifdef HAVE_GETAUTHUID
|
|
if (!strcmp(user_passwd, (char *) crypt16(pass, user_passwd)))
|
|
return; /* if the passwd is correct return() */
|
|
# endif /* HAVE_GETAUTHUID */
|
|
|
|
# ifdef HAVE_GETPRPWNAM
|
|
if (check_secureware(pass))
|
|
return; /* if the passwd is correct return() */
|
|
# endif /* HAVE_HAVE_GETPRPWNAM */
|
|
|
|
/* Normal UN*X password check */
|
|
if (!strcmp(user_passwd, (char *) crypt(pass, user_passwd)))
|
|
return; /* if the passwd is correct return() */
|
|
|
|
# ifdef HAVE_KERB4
|
|
if (user_uid && sudo_krb_validate_user(user_pw_ent, pass) == 0)
|
|
return;
|
|
# endif /* HAVE_KERB4 */
|
|
|
|
# ifdef HAVE_KERB5
|
|
if (sudo_krb5_validate_user(user_pw_ent, pass) == 0)
|
|
return;
|
|
# endif /* HAVE_KERB5 */
|
|
|
|
# ifdef HAVE_AFS
|
|
if (ka_UserAuthenticateGeneral(KA_USERAUTH_VERSION,
|
|
user_name, /* name */
|
|
NULL, /* instance */
|
|
NULL, /* realm */
|
|
pass, /* password */
|
|
0, /* lifetime */
|
|
0, 0, /* spare */
|
|
NULL) == 0) /* reason */
|
|
return;
|
|
# endif /* HAVE_AFS */
|
|
# ifdef HAVE_DCE
|
|
/*
|
|
* consult the DCE registry for password validation
|
|
* note that dce_pwent trashes pass upon return...
|
|
*/
|
|
if (dce_pwent(user_name, pass))
|
|
return;
|
|
# endif /* HAVE_DCE */
|
|
# endif /* !OTP_ONLY || (!HAVE_SKEY && !HAVE_OPIE) */
|
|
#endif /* HAVE_AUTHENTICATE */
|
|
|
|
--counter; /* otherwise, try again */
|
|
pass_warn(stderr);
|
|
}
|
|
|
|
if (counter > 0) {
|
|
log_error(PASSWORD_NOT_CORRECT);
|
|
inform_user(PASSWORD_NOT_CORRECT);
|
|
} else {
|
|
log_error(PASSWORDS_NOT_CORRECT);
|
|
inform_user(PASSWORDS_NOT_CORRECT);
|
|
}
|
|
|
|
exit(1);
|
|
}
|
|
#endif /* HAVE_AUTHSRV */
|
|
#endif /* HAVE_SECURID */
|
|
|
|
|
|
#ifdef HAVE_KERB4
|
|
/********************************************************************
|
|
*
|
|
* sudo_krb_validate_user()
|
|
*
|
|
* Validate a user via kerberos.
|
|
*/
|
|
static int sudo_krb_validate_user(pw, pass)
|
|
struct passwd *pw;
|
|
char *pass;
|
|
{
|
|
char realm[REALM_SZ];
|
|
char tkfile[sizeof(_PATH_SUDO_TIMEDIR) + 4 + MAX_UID_T_LEN];
|
|
int k_errno;
|
|
|
|
/* Get the local realm, or retrun failure (no krb.conf) */
|
|
if (krb_get_lrealm(realm, 1) != KSUCCESS)
|
|
return(-1);
|
|
|
|
/*
|
|
* Set the ticket file to be in sudo sudo timedir so we don't
|
|
* wipe out other kerberos tickets.
|
|
*/
|
|
(void) sprintf(tkfile, "%s/tkt%ld", _PATH_SUDO_TIMEDIR,
|
|
(long) pw->pw_uid);
|
|
(void) krb_set_tkt_string(tkfile);
|
|
|
|
/*
|
|
* Update the ticket if password is ok. Kerb4 expects
|
|
* the ruid and euid to be the same here so we setuid to root.
|
|
*/
|
|
set_perms(PERM_ROOT, 0);
|
|
k_errno = krb_get_pw_in_tkt(pw->pw_name, "", realm, "krbtgt", realm,
|
|
DEFAULT_TKT_LIFE, pass);
|
|
|
|
/*
|
|
* If we authenticated, destroy the ticket now that we are done with it.
|
|
* If not, warn on a "real" error.
|
|
*/
|
|
if (k_errno == INTK_OK)
|
|
dest_tkt();
|
|
else if (k_errno != INTK_BADPW && k_errno != KDC_PR_UNKNOWN)
|
|
(void) fprintf(stderr, "Warning: Kerberos error: %s\n",
|
|
krb_err_txt[k_errno]);
|
|
|
|
/* done with rootly stuff */
|
|
set_perms(PERM_USER, 0);
|
|
|
|
return(!(k_errno == INTK_OK));
|
|
}
|
|
#endif /* HAVE_KERB4 */
|
|
|
|
|
|
#ifdef HAVE_KERB5
|
|
/********************************************************************
|
|
*
|
|
* sudo_krb5_validate_user()
|
|
*
|
|
* Validate a user via Kerberos 5. We may lose a bit of memory, but it's
|
|
* OK since we're a short lived program. I'd rather do that than contort
|
|
* the code to handle the cleanup.
|
|
*/
|
|
static int sudo_krb5_validate_user(pw, pass)
|
|
struct passwd *pw;
|
|
char *pass;
|
|
{
|
|
krb5_error_code retval;
|
|
krb5_principal princ;
|
|
krb5_creds creds;
|
|
krb5_ccache ccache;
|
|
char cache_name[64];
|
|
char *princ_name;
|
|
krb5_get_init_creds_opt opts;
|
|
|
|
/* Initialize */
|
|
if (!sudo_context)
|
|
return -1;
|
|
krb5_get_init_creds_opt_init(&opts);
|
|
|
|
princ_name = malloc(strlen(pw->pw_name) + strlen(realm) + 2);
|
|
if (!princ_name) {
|
|
(void) fprintf(stderr, "%s: cannot allocate memory!\n", Argv[0]);
|
|
exit(1);
|
|
}
|
|
|
|
sprintf(princ_name, "%s@%s", pw->pw_name, realm);
|
|
if (retval = krb5_parse_name(sudo_context, princ_name, &princ))
|
|
return retval;
|
|
|
|
/* Set the ticket file to be in /tmp so we don't need to change perms. */
|
|
(void) sprintf(cache_name, "FILE:/tmp/sudocc_%ld", getpid());
|
|
if (retval = krb5_cc_resolve(sudo_context, cache_name, &ccache))
|
|
return retval;
|
|
|
|
if (retval = krb5_get_init_creds_password(sudo_context, &creds, princ,
|
|
pass, krb5_prompter_posix, NULL,
|
|
0, NULL, &opts))
|
|
return retval;
|
|
|
|
/* Stash the TGT so we can verify it. */
|
|
if (retval = krb5_cc_initialize(sudo_context, ccache, princ))
|
|
return retval;
|
|
if (retval = krb5_cc_store_cred(sudo_context, ccache, &creds)) {
|
|
(void) krb5_cc_destroy(sudo_context, ccache);
|
|
return retval;
|
|
}
|
|
|
|
retval = verify_krb_v5_tgt(ccache);
|
|
(void) krb5_cc_destroy(sudo_context, ccache);
|
|
return (retval == -1);
|
|
}
|
|
|
|
|
|
/*
|
|
* This routine with some modification is from the MIT V5B6 appl/bsd/login.c
|
|
*
|
|
* Verify the Kerberos ticket-granting ticket just retrieved for the
|
|
* user. If the Kerberos server doesn't respond, assume the user is
|
|
* trying to fake us out (since we DID just get a TGT from what is
|
|
* supposedly our KDC). If the host/<host> service is unknown (i.e.,
|
|
* the local keytab doesn't have it), let her in.
|
|
*
|
|
* Returns 1 for confirmation, -1 for failure, 0 for uncertainty.
|
|
*/
|
|
static int verify_krb_v5_tgt(ccache)
|
|
krb5_ccache ccache;
|
|
{
|
|
char phost[BUFSIZ];
|
|
krb5_error_code retval;
|
|
krb5_principal princ;
|
|
krb5_keyblock * keyblock = 0;
|
|
krb5_data packet;
|
|
krb5_auth_context auth_context = NULL;
|
|
|
|
packet.data = 0;
|
|
|
|
/*
|
|
* Get the server principal for the local host.
|
|
* (Use defaults of "host" and canonicalized local name.)
|
|
*/
|
|
if (krb5_sname_to_principal(sudo_context, NULL, NULL,
|
|
KRB5_NT_SRV_HST, &princ))
|
|
return -1;
|
|
|
|
/* Extract the name directly. */
|
|
strncpy(phost, krb5_princ_component(c, princ, 1)->data, BUFSIZ);
|
|
phost[BUFSIZ - 1] = '\0';
|
|
|
|
/*
|
|
* Do we have host/<host> keys?
|
|
* (use default keytab, kvno IGNORE_VNO to get the first match,
|
|
* and enctype is currently ignored anyhow.)
|
|
*/
|
|
if (retval = krb5_kt_read_service_key(sudo_context, NULL, princ, 0,
|
|
ENCTYPE_DES_CBC_MD5, &keyblock)) {
|
|
/* Keytab or service key does not exist */
|
|
if (xrealm)
|
|
retval = -1;
|
|
else
|
|
retval = 0;
|
|
goto cleanup;
|
|
}
|
|
if (keyblock)
|
|
krb5_free_keyblock(sudo_context, keyblock);
|
|
|
|
/* Talk to the kdc and construct the ticket. */
|
|
retval = krb5_mk_req(sudo_context, &auth_context, 0, "host", phost,
|
|
NULL, ccache, &packet);
|
|
if (auth_context) {
|
|
krb5_auth_con_free(sudo_context, auth_context);
|
|
auth_context = NULL; /* setup for rd_req */
|
|
}
|
|
if (retval) {
|
|
retval = -1;
|
|
goto cleanup;
|
|
}
|
|
|
|
/* Try to use the ticket. */
|
|
retval = krb5_rd_req(sudo_context, &auth_context, &packet, princ,
|
|
NULL, NULL, NULL);
|
|
if (retval) {
|
|
retval = -1;
|
|
} else {
|
|
retval = 1;
|
|
}
|
|
|
|
cleanup:
|
|
if (packet.data)
|
|
krb5_free_data_contents(sudo_context, &packet);
|
|
krb5_free_principal(sudo_context, princ);
|
|
return retval;
|
|
|
|
}
|
|
#endif /* HAVE_KERB5 */
|
|
|
|
|
|
#ifdef HAVE_PAM
|
|
/********************************************************************
|
|
* pam_attempt_auth()
|
|
*
|
|
* Try to authenticate the user using Pluggable Authentication
|
|
* Modules (PAM). Added 9/11/98 by Gary J. Calvin
|
|
*/
|
|
static void pam_attempt_auth()
|
|
{
|
|
pam_handle_t *pamh=NULL;
|
|
int retval;
|
|
register int counter = TRIES_FOR_PASSWORD;
|
|
struct pam_conv conv = {
|
|
misc_conv,
|
|
NULL
|
|
};
|
|
|
|
set_perms(PERM_ROOT, 0);
|
|
retval = pam_start("sudo", user_name, &conv, &pamh);
|
|
if (retval != PAM_SUCCESS) {
|
|
pam_end(pamh, retval);
|
|
exit(1);
|
|
}
|
|
while (counter > 0) {
|
|
retval = pam_authenticate(pamh, 0);
|
|
if (retval == PAM_SUCCESS) {
|
|
set_perms(PERM_USER, 0);
|
|
pam_end(pamh, retval);
|
|
return;
|
|
}
|
|
|
|
--counter;
|
|
pass_warn(stderr);
|
|
}
|
|
set_perms(PERM_USER, 0);
|
|
|
|
if (counter > 0) {
|
|
log_error(PASSWORD_NOT_CORRECT);
|
|
inform_user(PASSWORD_NOT_CORRECT);
|
|
} else {
|
|
log_error(PASSWORDS_NOT_CORRECT);
|
|
inform_user(PASSWORDS_NOT_CORRECT);
|
|
}
|
|
pam_end(pamh, retval);
|
|
exit(1);
|
|
}
|
|
#endif /* HAVE_PAM */
|
|
|
|
#ifdef HAVE_SKEY
|
|
/********************************************************************
|
|
*
|
|
* sudo_skeyprompt()
|
|
*
|
|
* This function rewrites and return the prompt based the
|
|
* s/key challenge * and fills in the user's skey structure.
|
|
*/
|
|
|
|
static char *sudo_skeyprompt(user_skey, p)
|
|
struct skey *user_skey;
|
|
char *p;
|
|
{
|
|
char challenge[256];
|
|
int rval;
|
|
static char *orig_prompt = NULL, *new_prompt = NULL;
|
|
static int op_len, np_size;
|
|
|
|
/* save the original prompt */
|
|
if (orig_prompt == NULL) {
|
|
orig_prompt = p;
|
|
op_len = strlen(p);
|
|
|
|
/* ignore trailing colon */
|
|
if (p[op_len - 1] == ':')
|
|
op_len--;
|
|
}
|
|
|
|
/* close old stream */
|
|
if (user_skey->keyfile)
|
|
(void) fclose(user_skey->keyfile);
|
|
|
|
/* get the skey part of the prompt */
|
|
if ((rval = skeychallenge(user_skey, user_name, challenge)) != 0) {
|
|
#ifdef OTP_ONLY
|
|
(void) fprintf(stderr,
|
|
"%s: You do not exist in the s/key database.\n",
|
|
Argv[0]);
|
|
exit(1);
|
|
#else
|
|
/* return the original prompt if we cannot get s/key info */
|
|
return(orig_prompt);
|
|
#endif /* OTP_ONLY */
|
|
}
|
|
|
|
/* get space for new prompt with embedded s/key challenge */
|
|
if (new_prompt == NULL) {
|
|
/* allocate space for new prompt */
|
|
np_size = op_len + strlen(challenge) + 7;
|
|
if (!(new_prompt = (char *) malloc(np_size))) {
|
|
(void) fprintf(stderr, "%s: cannot allocate memory!\n", Argv[0]);
|
|
exit(1);
|
|
}
|
|
} else {
|
|
/* already have space allocated, is it enough? */
|
|
if (np_size < op_len + strlen(challenge) + 7) {
|
|
np_size = op_len + strlen(challenge) + 7;
|
|
if (!(new_prompt = (char *) realloc(new_prompt, np_size))) {
|
|
(void) fprintf(stderr, "%s: cannot allocate memory!\n",
|
|
Argv[0]);
|
|
exit(1);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* embed the s/key challenge into the new password prompt */
|
|
#ifdef LONG_OTP_PROMPT
|
|
(void) sprintf(new_prompt, "%s\n%s", challenge, orig_prompt);
|
|
#else
|
|
(void) sprintf(new_prompt, "%.*s [ %s ]:", op_len, orig_prompt, challenge);
|
|
#endif /* LONG_OTP_PROMPT */
|
|
|
|
return(new_prompt);
|
|
}
|
|
#endif /* HAVE_SKEY */
|
|
|
|
|
|
#ifdef HAVE_OPIE
|
|
/********************************************************************
|
|
*
|
|
* sudo_opieprompt()
|
|
*
|
|
* This function rewrites and return the prompt based the
|
|
* OPIE challenge * and fills in the user's opie structure.
|
|
*/
|
|
|
|
static char *sudo_opieprompt(user_opie, p)
|
|
struct opie *user_opie;
|
|
char *p;
|
|
{
|
|
char challenge[OPIE_CHALLENGE_MAX];
|
|
int rval;
|
|
static char *orig_prompt = NULL, *new_prompt = NULL;
|
|
static int op_len, np_size;
|
|
|
|
/* save the original prompt */
|
|
if (orig_prompt == NULL) {
|
|
orig_prompt = p;
|
|
op_len = strlen(p);
|
|
|
|
/* ignore trailing colon */
|
|
if (p[op_len - 1] == ':')
|
|
op_len--;
|
|
}
|
|
|
|
/* get the opie part of the prompt */
|
|
if ((rval = opiechallenge(user_opie, user_name, challenge)) != 0) {
|
|
#ifdef OTP_ONLY
|
|
(void) fprintf(stderr,
|
|
"%s: You do not exist in the opie database.\n",
|
|
Argv[0]);
|
|
exit(1);
|
|
#else
|
|
/* return the original prompt if we cannot get opie info */
|
|
return(orig_prompt);
|
|
#endif /* OTP_ONLY */
|
|
}
|
|
|
|
/* get space for new prompt with embedded opie challenge */
|
|
if (new_prompt == NULL) {
|
|
/* allocate space for new prompt */
|
|
np_size = op_len + strlen(challenge) + 7;
|
|
if (!(new_prompt = (char *) malloc(np_size))) {
|
|
(void) fprintf(stderr, "%s: cannot allocate memory!\n", Argv[0]);
|
|
exit(1);
|
|
}
|
|
} else {
|
|
/* already have space allocated, is it enough? */
|
|
if (np_size < op_len + strlen(challenge) + 7) {
|
|
np_size = op_len + strlen(challenge) + 7;
|
|
if (!(new_prompt = (char *) realloc(new_prompt, np_size))) {
|
|
(void) fprintf(stderr, "%s: cannot allocate memory!\n",
|
|
Argv[0]);
|
|
exit(1);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* embed the s/key challenge into the new password prompt */
|
|
#ifdef LONG_OTP_PROMPT
|
|
(void) sprintf(new_prompt, "%s\n%s", challenge, orig_prompt);
|
|
#else
|
|
(void) sprintf(new_prompt, "%.*s [ %s ]:", op_len, orig_prompt, challenge);
|
|
#endif /* LONG_OTP_PROMPT */
|
|
|
|
return(new_prompt);
|
|
}
|
|
#endif /* HAVE_OPIE */
|
|
|
|
|
|
#ifndef NO_MESSAGE
|
|
/********************************************************************
|
|
*
|
|
* reminder()
|
|
*
|
|
* this function just prints the the reminder message
|
|
*/
|
|
|
|
static void reminder()
|
|
{
|
|
#ifdef SHORT_MESSAGE
|
|
(void) fprintf(stderr, "\n%s\n%s\n\n%s\n%s\n\n",
|
|
#else
|
|
(void) fprintf(stderr, "\n%s%s%s\n%s\n%s\n%s\n\n%s\n%s\n\n%s\n%s\n\n",
|
|
" CU Sudo version ", version, ", based on Root Group sudo version 1.1.",
|
|
" sudo version 1.1 is Copyright (C) 1991 The Root Group, Inc.",
|
|
" sudo comes with ABSOLUTELY NO WARRANTY. This is free software,",
|
|
" and you are welcome to redistribute it under certain conditions.",
|
|
#endif
|
|
"We trust you have received the usual lecture from the local System",
|
|
"Administrator. It usually boils down to these two things:",
|
|
" #1) Respect the privacy of others.",
|
|
" #2) Think before you type."
|
|
);
|
|
}
|
|
#endif /* NO_MESSAGE */
|
|
|
|
|
|
/********************************************************************
|
|
*
|
|
* pass_warn()
|
|
*
|
|
* warn the user that the password was incorrect
|
|
* (and insult them if insults are configured).
|
|
*/
|
|
|
|
void pass_warn(fp)
|
|
FILE *fp;
|
|
{
|
|
|
|
#ifdef USE_INSULTS
|
|
(void) fprintf(fp, "%s\n", INSULT);
|
|
#else
|
|
(void) fprintf(fp, "%s\n", INCORRECT_PASSWORD);
|
|
#endif /* USE_INSULTS */
|
|
}
|
|
|
|
/********************************************************************
|
|
*
|
|
* expand_prompt()
|
|
*
|
|
* expand %h and %u in the prompt and pass back the dynamically
|
|
* allocated result. Returns the same string if no escapes.
|
|
*/
|
|
|
|
static char *expand_prompt(old_prompt, user, host)
|
|
char *old_prompt;
|
|
char *user;
|
|
char *host;
|
|
{
|
|
size_t len;
|
|
int subst;
|
|
char *p, *np, *new_prompt, lastchar;
|
|
|
|
/* How much space do we need to malloc for the prompt? */
|
|
subst = 0;
|
|
for (p = old_prompt, len = strlen(old_prompt), lastchar = '\0'; *p; p++) {
|
|
if (lastchar == '%') {
|
|
if (*p == 'h') {
|
|
len += strlen(shost) - 2;
|
|
subst = 1;
|
|
} else if (*p == 'u') {
|
|
len += strlen(user_name) - 2;
|
|
subst = 1;
|
|
}
|
|
}
|
|
|
|
if (lastchar == '%' && *p == '%') {
|
|
lastchar = '\0';
|
|
len--;
|
|
} else
|
|
lastchar = *p;
|
|
}
|
|
|
|
if (subst) {
|
|
if ((new_prompt = (char *) malloc(len + 1)) == NULL) {
|
|
(void) fprintf(stderr, "%s: cannot allocate memory!\n", Argv[0]);
|
|
exit(1);
|
|
}
|
|
for (p = prompt, np = new_prompt; *p; p++) {
|
|
if (lastchar == '%' && (*p == 'h' || *p == 'u' || *p == '%')) {
|
|
/* substiture user/host name */
|
|
if (*p == 'h') {
|
|
np--;
|
|
strcpy(np, shost);
|
|
np += strlen(shost);
|
|
} else if (*p == 'u') {
|
|
np--;
|
|
strcpy(np, user_name);
|
|
np += strlen(user_name);
|
|
}
|
|
} else
|
|
*np++ = *p;
|
|
|
|
if (lastchar == '%' && *p == '%')
|
|
lastchar = '\0';
|
|
else
|
|
lastchar = *p;
|
|
}
|
|
*np = '\0';
|
|
} else
|
|
new_prompt = prompt;
|
|
|
|
return(new_prompt);
|
|
}
|