freebsd-dev/crypto/kerberosIV/appl/bsd/login.c
2000-01-09 08:31:47 +00:00

1107 lines
28 KiB
C

/*-
* Copyright (c) 1980, 1987, 1988, 1991, 1993, 1994
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
/*
* login [ name ]
* login -h hostname (for telnetd, etc.)
* login -f name (for pre-authenticated login: datakit, xterm, etc.)
*/
#include "bsd_locl.h"
#ifdef HAVE_CAPABILITY_H
#include <capability.h>
#endif
#ifdef HAVE_SYS_CAPABILITY_H
#include <sys/capability.h>
#endif
RCSID("$Id: login.c,v 1.125 1999/11/30 19:24:01 bg Exp $");
#ifdef OTP
#include <otp.h>
#endif
#include "sysv_default.h"
#ifdef SYSV_SHADOW
#include "sysv_shadow.h"
#endif
static void badlogin (char *);
static void checknologin (void);
static void dolastlog (int);
static void getloginname (int);
static int rootterm (char *);
static char *stypeof (char *);
static RETSIGTYPE timedout (int);
static int doremotelogin (char *);
void login_fbtab (char *, uid_t, gid_t);
#ifdef KERBEROS
int klogin (struct passwd *, char *, char *, char *);
#endif
#define TTYGRPNAME "tty" /* name of group to own ttys */
/*
* This bounds the time given to login. Change it in
* `/etc/default/login'.
*/
static u_int login_timeout;
#ifdef KERBEROS
int notickets = 1;
int noticketsdontcomplain = 1;
char *instance;
char *krbtkfile_env;
int authok;
#endif
#ifdef HAVE_SHADOW_H
static struct spwd *spwd = NULL;
#endif
static char *ttyprompt;
static struct passwd *pwd;
static int failures;
static char term[64], *hostname, *username, *tty;
static char rusername[100], lusername[100];
static int
change_passwd(struct passwd *who)
{
int status;
pid_t pid;
switch (pid = fork()) {
case -1:
warn("fork /bin/passwd");
sleepexit(1);
case 0:
execlp("/bin/passwd", "passwd", who->pw_name, (char *) 0);
_exit(1);
default:
waitpid(pid, &status, 0);
return (status);
}
}
#ifndef NO_MOTD /* message of the day stuff */
jmp_buf motdinterrupt;
static RETSIGTYPE
sigint(int signo)
{
longjmp(motdinterrupt, 1);
}
static void
motd(void)
{
int fd, nchars;
RETSIGTYPE (*oldint)();
char tbuf[8192];
if ((fd = open(_PATH_MOTDFILE, O_RDONLY, 0)) < 0)
return;
oldint = signal(SIGINT, sigint);
if (setjmp(motdinterrupt) == 0)
while ((nchars = read(fd, tbuf, sizeof(tbuf))) > 0)
write(fileno(stdout), tbuf, nchars);
signal(SIGINT, oldint);
close(fd);
}
#endif /* !NO_MOTD */
#define AUTH_NONE 0
#define AUTH_OTP 1
/*
* getpwnam and try to detect the worst form of NIS attack.
*/
static struct passwd *
paranoid_getpwnam (char *user)
{
struct passwd *p;
p = k_getpwnam (user);
if (p == NULL)
return p;
if (p->pw_uid == 0 && strcmp (username, "root") != 0) {
syslog (LOG_ALERT,
"NIS attack, user %s has uid 0", username);
return NULL;
}
return p;
}
int
main(int argc, char **argv)
{
struct group *gr;
int ask, ch, cnt, fflag, hflag, pflag, quietlog, nomailcheck;
int rootlogin, rval;
int rflag;
int changepass = 0;
uid_t uid;
char *domain, *p, passwd[128], *ttyn;
char tbuf[MaxPathLen + 2], tname[sizeof(_PATH_TTY) + 10];
char localhost[MaxHostNameLen];
char full_hostname[MaxHostNameLen];
int auth_level = AUTH_NONE;
#ifdef OTP
OtpContext otp_ctx;
#endif
int mask = 022; /* Default umask (set below) */
int maxtrys = 5; /* Default number of allowed failed logins */
set_progname(argv[0]);
openlog("login", LOG_ODELAY, LOG_AUTH);
/* Read defaults file and set the login timeout period. */
sysv_defaults();
login_timeout = atoi(default_timeout);
maxtrys = atoi(default_maxtrys);
if (sscanf(default_umask, "%o", &mask) != 1 || (mask & ~0777))
syslog(LOG_WARNING, "bad umask default: %s", default_umask);
else
umask(mask);
signal(SIGALRM, timedout);
alarm(login_timeout);
signal(SIGQUIT, SIG_IGN);
signal(SIGINT, SIG_IGN);
setpriority(PRIO_PROCESS, 0, 0);
/*
* -p is used by getty to tell login not to destroy the environment
* -f is used to skip a second login authentication
* -h is used by other servers to pass the name of the remote
* host to login so that it may be placed in utmp and wtmp
* -r is used by old-style rlogind to execute the autologin protocol
*/
*full_hostname = '\0';
domain = NULL;
if (gethostname(localhost, sizeof(localhost)) < 0)
syslog(LOG_ERR, "couldn't get local hostname: %m");
else
domain = strchr(localhost, '.');
fflag = hflag = pflag = rflag = 0;
uid = getuid();
while ((ch = getopt(argc, argv, "a:d:fh:pr:")) != -1)
switch (ch) {
case 'a':
if (strcmp (optarg, "none") == 0)
auth_level = AUTH_NONE;
#ifdef OTP
else if (strcmp (optarg, "otp") == 0)
auth_level = AUTH_OTP;
#endif
else
warnx ("bad value for -a: %s", optarg);
break;
case 'd':
break;
case 'f':
fflag = 1;
break;
case 'h':
if (rflag || hflag) {
printf("Only one of -r and -h allowed\n");
exit(1);
}
if (uid)
errx(1, "-h option: %s", strerror(EPERM));
hflag = 1;
strlcpy(full_hostname,
optarg,
sizeof(full_hostname));
if (domain && (p = strchr(optarg, '.')) &&
strcasecmp(p, domain) == 0)
*p = 0;
hostname = optarg;
break;
case 'p':
if (getuid()) {
warnx("-p for super-user only.");
exit(1);
}
pflag = 1;
break;
case 'r':
if (rflag || hflag) {
warnx("Only one of -r and -h allowed\n");
exit(1);
}
if (getuid()) {
warnx("-r for super-user only.");
exit(1);
}
rflag = 1;
strlcpy(full_hostname,
optarg,
sizeof(full_hostname));
if (domain && (p = strchr(optarg, '.')) &&
strcasecmp(p, domain) == 0)
*p = 0;
hostname = optarg;
fflag = (doremotelogin(full_hostname) == 0);
break;
case '?':
default:
if (!uid)
syslog(LOG_ERR, "invalid flag %c", ch);
fprintf(stderr,
"usage: login [-fp]"
#ifdef OTP
" [-a otp]"
#endif
" [-h hostname | -r hostname] [username]\n");
exit(1);
}
argc -= optind;
argv += optind;
if (geteuid() != 0) {
warnx("only root may use login, use su");
/* Or install login setuid root, which is not necessary */
sleep(10);
exit(1);
}
/*
* Figure out if we should ask for the username or not. The name
* may be given on the command line or via the environment, and
* it may even be in the terminal input queue.
*/
if (rflag) {
username = lusername;
ask = 0;
} else
if (*argv && strchr(*argv, '=')) {
ask = 1;
} else
if (*argv && strcmp(*argv, "-") == 0) {
argc--;
argv++;
ask = 1;
} else
if (*argv) {
username = *argv;
ask = 0;
argc--;
argv++;
} else if ((ttyprompt = getenv("TTYPROMPT")) && *ttyprompt) {
getloginname(0);
ask = 0;
} else
ask = 1;
/* Default tty settings. */
stty_default();
for (cnt = getdtablesize(); cnt > 2; cnt--)
close(cnt);
/*
* Determine the tty name. BSD takes the basename, SYSV4 takes
* whatever remains after stripping the "/dev/" prefix. The code
* below should produce sensible results in either environment.
*/
ttyn = ttyname(STDIN_FILENO);
if (ttyn == NULL || *ttyn == '\0') {
snprintf(tname, sizeof(tname), "%s??", _PATH_TTY);
ttyn = tname;
}
if ((tty = strchr(ttyn + 1, '/')))
++tty;
else
tty = ttyn;
for (cnt = 0;; ask = 1) {
char prompt[128], ss[256];
if (ask) {
fflag = 0;
getloginname(1);
}
rootlogin = 0;
rval = 1;
#ifdef KERBEROS
if ((instance = strchr(username, '.')) != NULL) {
if (strcmp(instance, ".root") == 0)
rootlogin = 1;
*instance++ = '\0';
} else
instance = "";
#endif
if (strlen(username) > UT_NAMESIZE)
username[UT_NAMESIZE] = '\0';
/*
* Note if trying multiple user names; log failures for
* previous user name, but don't bother logging one failure
* for nonexistent name (mistyped username).
*/
if (failures && strcmp(tbuf, username)) {
if (failures > (pwd ? 0 : 1))
badlogin(tbuf);
failures = 0;
}
strlcpy(tbuf, username, sizeof(tbuf));
pwd = paranoid_getpwnam (username);
/*
* if we have a valid account name, and it doesn't have a
* password, or the -f option was specified and the caller
* is root or the caller isn't changing their uid, don't
* authenticate.
*/
if (pwd) {
if (pwd->pw_uid == 0)
rootlogin = 1;
if (fflag && (uid == 0 || uid == pwd->pw_uid)) {
/* already authenticated */
break;
} else if (pwd->pw_passwd[0] == '\0') {
/* pretend password okay */
rval = 0;
goto ttycheck;
}
}
fflag = 0;
setpriority(PRIO_PROCESS, 0, -4);
#ifdef OTP
if (otp_challenge (&otp_ctx, username,
ss, sizeof(ss)) == 0)
snprintf (prompt, sizeof(prompt), "%s's %s Password: ",
username, ss);
else
#endif
{
if (auth_level == AUTH_NONE)
snprintf(prompt, sizeof(prompt), "%s's Password: ",
username);
else {
char *s;
rval = 1;
#ifdef OTP
s = otp_error(&otp_ctx);
if(s)
printf ("OTP: %s\n", s);
#endif
continue;
}
}
if (des_read_pw_string (passwd, sizeof(passwd) - 1, prompt, 0))
continue;
passwd[sizeof(passwd) - 1] = '\0';
/* Verify it somehow */
#ifdef OTP
if (otp_verify_user (&otp_ctx, passwd) == 0)
rval = 0;
else
#endif
if (pwd == NULL)
;
else if (auth_level == AUTH_NONE) {
uid_t pwd_uid = pwd->pw_uid;
rval = unix_verify_user (username, passwd);
if (rval == 0)
{
if (rootlogin && pwd_uid != 0)
rootlogin = 0;
}
else
{
rval = klogin(pwd, instance, localhost, passwd);
if (rval != 0 && rootlogin && pwd_uid != 0)
rootlogin = 0;
if (rval == 0)
authok = 1;
}
} else {
char *s;
rval = 1;
#ifdef OTP
if ((s = otp_error(&otp_ctx)))
printf ("OTP: %s\n", s);
#endif
}
memset (passwd, 0, sizeof(passwd));
setpriority (PRIO_PROCESS, 0, 0);
/*
* Santa Claus, give me a portable and reentrant getpwnam.
*/
pwd = paranoid_getpwnam (username);
ttycheck:
/*
* If trying to log in as root without Kerberos,
* but with insecure terminal, refuse the login attempt.
*/
#ifdef KERBEROS
if (authok == 0)
#endif
if (pwd && !rval && rootlogin && !rootterm(tty)
&& !rootterm(ttyn)) {
warnx("%s login refused on this terminal.",
pwd->pw_name);
if (hostname)
syslog(LOG_NOTICE,
"LOGIN %s REFUSED FROM %s ON TTY %s",
pwd->pw_name, hostname, tty);
else
syslog(LOG_NOTICE,
"LOGIN %s REFUSED ON TTY %s",
pwd->pw_name, tty);
continue;
}
if (rval == 0)
break;
printf("Login incorrect\n");
failures++;
/* max number of attemps and delays taken from defaults file */
/* we allow maxtrys tries, but after 2 we start backing off */
if (++cnt > 2) {
if (cnt >= maxtrys) {
badlogin(username);
sleepexit(1);
}
sleep((u_int)((cnt - 2) * atoi(default_sleep)));
}
}
/* committed to login -- turn off timeout */
alarm(0);
endpwent();
#if defined(HAVE_GETUDBNAM) && defined(HAVE_SETLIM)
{
struct udb *udb;
long t;
const long maxcpu = 46116860184; /* some random constant */
if(setjob(pwd->pw_uid, 0) < 0)
warn("setjob");
udb = getudbnam(pwd->pw_name);
if(udb == UDB_NULL)
errx(1, "Failed to get UDB entry.");
/* per process cpu limit */
t = udb->ue_pcpulim[UDBRC_INTER];
if(t == 0 || t > maxcpu)
t = CPUUNLIM;
else
t *= CLK_TCK;
if(limit(C_PROC, 0, L_CPU, t) < 0)
warn("limit process cpu");
/* per process memory limit */
if(limit(C_PROC, 0, L_MEM, udb->ue_pmemlim[UDBRC_INTER]) < 0)
warn("limit process memory");
/* per job cpu limit */
t = udb->ue_jcpulim[UDBRC_INTER];
if(t == 0 || t > maxcpu)
t = CPUUNLIM;
else
t *= CLK_TCK;
if(limit(C_JOB, 0, L_CPU, t) < 0)
warn("limit job cpu");
/* per job processor limit */
if(limit(C_JOB, 0, L_CPROC, udb->ue_jproclim[UDBRC_INTER]) < 0)
warn("limit job processors");
/* per job memory limit */
if(limit(C_JOB, 0, L_MEM, udb->ue_jmemlim[UDBRC_INTER]) < 0)
warn("limit job memory");
nice(udb->ue_nice[UDBRC_INTER]);
}
#endif
/* if user not super-user, check for disabled logins */
if (!rootlogin)
checknologin();
if (chdir(pwd->pw_dir) < 0) {
printf("No home directory %s!\n", pwd->pw_dir);
if (chdir("/"))
exit(0);
pwd->pw_dir = "/";
printf("Logging in with home = \"/\".\n");
}
quietlog = access(_PATH_HUSHLOGIN, F_OK) == 0;
nomailcheck = access(_PATH_NOMAILCHECK, F_OK) == 0;
#if defined(HAVE_PASSWD_CHANGE) && defined(HAVE_PASSWD_EXPIRE)
if (pwd->pw_change || pwd->pw_expire)
gettimeofday(&tp, (struct timezone *)NULL);
if (pwd->pw_change)
if (tp.tv_sec >= pwd->pw_change) {
printf("Sorry -- your password has expired.\n");
changepass=1;
} else if (pwd->pw_change - tp.tv_sec <
2 * DAYSPERWEEK * SECSPERDAY && !quietlog)
printf("Warning: your password expires on %s",
ctime(&pwd->pw_change));
if (pwd->pw_expire)
if (tp.tv_sec >= pwd->pw_expire) {
printf("Sorry -- your account has expired.\n");
sleepexit(1);
} else if (pwd->pw_expire - tp.tv_sec <
2 * DAYSPERWEEK * SECSPERDAY && !quietlog)
printf("Warning: your account expires on %s",
ctime(&pwd->pw_expire));
#endif /* defined(HAVE_PASSWD_CHANGE) && defined(HAVE_PASSWD_EXPIRE) */
/* Nothing else left to fail -- really log in. */
/*
* Update the utmp files, both BSD and SYSV style.
*/
if (utmpx_login(tty, username, hostname ? hostname : "") != 0
&& !fflag) {
printf("No utmpx entry. You must exec \"login\" from the lowest level \"sh\".\n");
sleepexit(0);
}
utmp_login(ttyn, username, hostname ? hostname : "");
dolastlog(quietlog);
/*
* Set device protections, depending on what terminal the
* user is logged in. This feature is used on Suns to give
* console users better privacy.
*/
login_fbtab(tty, pwd->pw_uid, pwd->pw_gid);
if (chown(ttyn, pwd->pw_uid,
(gr = getgrnam(TTYGRPNAME)) ? gr->gr_gid : pwd->pw_gid) < 0)
err(1, "chown tty failed");
if (chmod(ttyn, S_IRUSR | S_IWUSR | S_IWGRP) < 0)
err(1, "chmod tty failed");
setgid(pwd->pw_gid);
initgroups(username, pwd->pw_gid);
if (*pwd->pw_shell == '\0')
pwd->pw_shell = _PATH_BSHELL;
/*
* Set up a new environment. With SYSV, some variables are always
* preserved; some varables are never preserved, and some variables
* are always clobbered. With BSD, nothing is always preserved, and
* some variables are always clobbered. We add code to make sure
* that LD_* and IFS are never preserved.
*/
if (term[0] == '\0')
strlcpy(term, stypeof(tty), sizeof(term));
/* set up a somewhat censored environment. */
sysv_newenv(argc, argv, pwd, term, pflag);
#ifdef KERBEROS
if (krbtkfile_env)
setenv("KRBTKFILE", krbtkfile_env, 1);
#endif
if (tty[sizeof("tty")-1] == 'd')
syslog(LOG_INFO, "DIALUP %s, %s", tty, pwd->pw_name);
/* If fflag is on, assume caller/authenticator has logged root login. */
if (rootlogin && fflag == 0) {
if (hostname)
syslog(LOG_NOTICE, "ROOT LOGIN (%s) ON %s FROM %s",
username, tty, hostname);
else
syslog(LOG_NOTICE, "ROOT LOGIN (%s) ON %s", username, tty);
}
#ifdef KERBEROS
if (!quietlog && notickets == 1 && !noticketsdontcomplain)
printf("Warning: no Kerberos tickets issued.\n");
#endif
#ifdef LOGALL
/*
* Syslog each successful login, so we don't have to watch hundreds
* of wtmp or lastlogin files.
*/
if (hostname) {
syslog(LOG_INFO, "login from %s as %s", hostname, pwd->pw_name);
} else {
syslog(LOG_INFO, "login on %s as %s", tty, pwd->pw_name);
}
#endif
#ifndef NO_MOTD
/*
* Optionally show the message of the day. System V login leaves
* motd and mail stuff up to the shell startup file.
*/
if (!quietlog) {
struct stat st;
#if 0
printf("%s\n\t%s %s\n\n",
"Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994",
"The Regents of the University of California. ",
"All rights reserved.");
#endif
motd();
if(!nomailcheck){
snprintf(tbuf, sizeof(tbuf), "%s/%s", _PATH_MAILDIR, pwd->pw_name);
if (stat(tbuf, &st) == 0 && st.st_size != 0)
printf("You have %smail.\n",
(st.st_mtime > st.st_atime) ? "new " : "");
}
}
#endif /* NO_MOTD */
#ifdef LOGIN_ACCESS
if (login_access(pwd, hostname ? full_hostname : tty) == 0) {
printf("Permission denied\n");
if (hostname)
syslog(LOG_NOTICE, "%s LOGIN REFUSED FROM %s",
pwd->pw_name, hostname);
else
syslog(LOG_NOTICE, "%s LOGIN REFUSED ON %s",
pwd->pw_name, tty);
sleepexit(1);
}
#endif
signal(SIGALRM, SIG_DFL);
signal(SIGQUIT, SIG_DFL);
signal(SIGINT, SIG_DFL);
#ifdef SIGTSTP
signal(SIGTSTP, SIG_IGN);
#endif
p = strrchr(pwd->pw_shell, '/');
snprintf (tbuf, sizeof(tbuf), "-%s", p ? p + 1 : pwd->pw_shell);
#ifdef HAVE_SETLOGIN
if (setlogin(pwd->pw_name) < 0)
syslog(LOG_ERR, "setlogin() failure: %m");
#endif
#ifdef HAVE_SETPCRED
if (setpcred (pwd->pw_name, NULL) == -1)
syslog(LOG_ERR, "setpcred() failure: %m");
#endif /* HAVE_SETPCRED */
#if defined(SYSV_SHADOW) && defined(HAVE_GETSPNAM)
spwd = getspnam (username);
endspent ();
#endif
/* perhaps work some magic */
if(do_osfc2_magic(pwd->pw_uid))
sleepexit(1);
#if defined(HAVE_SGI_GETCAPABILITYBYNAME) && defined(HAVE_CAP_SET_PROC)
/* XXX SGI capability hack IRIX 6.x (x >= 0?) has something
called capabilities, that allow you to give away
permissions (such as chown) to specific processes. From 6.5
this is default on, and the default capability set seems to
not always be the empty set. The problem is that the
runtime linker refuses to do just about anything if the
process has *any* capabilities set, so we have to remove
them here (unless otherwise instructed by /etc/capability).
In IRIX < 6.5, these functions was called sgi_cap_setproc,
etc, but we ignore this fact (it works anyway). */
{
struct user_cap *ucap = sgi_getcapabilitybyname(pwd->pw_name);
cap_t cap;
if(ucap == NULL)
cap = cap_from_text("all=");
else
cap = cap_from_text(ucap->ca_default);
if(cap == NULL)
err(1, "cap_from_text");
if(cap_set_proc(cap) < 0)
err(1, "cap_set_proc");
cap_free(cap);
free(ucap);
}
#endif
/* Discard permissions last so can't get killed and drop core. */
{
int uid = rootlogin ? 0 : pwd->pw_uid;
if(setuid(uid) != 0){
warn("setuid(%d)", uid);
if(!rootlogin)
exit(1);
}
}
/*
* After dropping privileges and after cleaning up the environment,
* optionally run, as the user, /bin/passwd.
*/
if (pwd->pw_passwd[0] == 0 &&
strcasecmp(default_passreq, "YES") == 0) {
printf("You don't have a password. Choose one.\n");
if (change_passwd(pwd))
sleepexit(0);
changepass = 0;
}
#ifdef SYSV_SHADOW
if (spwd && sysv_expire(spwd)) {
if (change_passwd(pwd))
sleepexit(0);
changepass = 0;
}
#endif /* SYSV_SHADOW */
if (changepass) {
int res;
if ((res=system(_PATH_CHPASS)))
sleepexit(1);
}
if (k_hasafs()) {
char cell[64];
#ifdef _AIX
/* XXX this is a fix for a bug in AFS for AIX 4.3, w/o
this hack the kernel crashes on the following
pioctl... */
char *pw_dir = strdup(pwd->pw_dir);
#else
char *pw_dir = pwd->pw_dir;
#endif
k_setpag();
if(k_afs_cell_of_file(pw_dir, cell, sizeof(cell)) == 0)
krb_afslog(cell, 0);
krb_afslog(0, 0);
}
execlp(pwd->pw_shell, tbuf, 0);
if (getuid() == 0) {
warnx("Can't exec %s, trying %s\n",
pwd->pw_shell, _PATH_BSHELL);
execlp(_PATH_BSHELL, tbuf, 0);
err(1, "%s", _PATH_BSHELL);
}
err(1, "%s", pwd->pw_shell);
return 1;
}
#ifdef KERBEROS
#define NBUFSIZ (UT_NAMESIZE + 1 + 5) /* .root suffix */
#else
#define NBUFSIZ (UT_NAMESIZE + 1)
#endif
static void
getloginname(int prompt)
{
int ch;
char *p;
static char nbuf[NBUFSIZ];
for (;;) {
if (prompt) {
if (ttyprompt && *ttyprompt)
printf("%s", ttyprompt);
else
printf("login: ");
}
prompt = 1;
for (p = nbuf; (ch = getchar()) != '\n'; ) {
if (ch == EOF) {
badlogin(username);
exit(0);
}
if (p < nbuf + (NBUFSIZ - 1))
*p++ = ch;
}
if (p > nbuf) {
if (nbuf[0] == '-')
warnx("login names may not start with '-'.");
else {
*p = '\0';
username = nbuf;
break;
}
}
}
}
static int
find_in_etc_securetty (char *ttyn)
{
FILE *f;
char buf[128];
int ret = 0;
f = fopen (_PATH_ETC_SECURETTY, "r");
if (f == NULL)
return 0;
while (fgets(buf, sizeof(buf), f) != NULL) {
if(buf[strlen(buf) - 1] == '\n')
buf[strlen(buf) - 1] = '\0';
if (strcmp (buf, ttyn) == 0) {
ret = 1;
break;
}
}
fclose(f);
return ret;
}
static int
rootterm(char *ttyn)
{
#ifdef HAVE_TTYENT_H
{
struct ttyent *t;
t = getttynam (ttyn);
if (t && t->ty_status & TTY_SECURE)
return 1;
}
#endif
if (find_in_etc_securetty(ttyn))
return 1;
if (default_console == 0 || strcmp(default_console, ttyn) == 0)
return 1;
return 0;
}
static RETSIGTYPE
timedout(int signo)
{
fprintf(stderr, "Login timed out after %d seconds\n",
login_timeout);
exit(0);
}
static void
checknologin(void)
{
int fd, nchars;
char tbuf[8192];
if ((fd = open(_PATH_NOLOGIN, O_RDONLY, 0)) >= 0) {
while ((nchars = read(fd, tbuf, sizeof(tbuf))) > 0)
write(fileno(stdout), tbuf, nchars);
sleepexit(0);
}
}
static void
dolastlog(int quiet)
{
#if defined(HAVE_LASTLOG_H) || defined(HAVE_LOGIN_H)
struct lastlog ll;
int fd;
if ((fd = open(_PATH_LASTLOG, O_RDWR, 0)) >= 0) {
lseek(fd, (off_t)pwd->pw_uid * sizeof(ll), SEEK_SET);
#ifdef SYSV_SHADOW
if (read(fd, &ll, sizeof(ll)) == sizeof(ll) &&
ll.ll_time != 0) {
if (pwd->pw_uid && spwd && spwd->sp_inact > 0
&& ll.ll_time / (24 * 60 * 60)
+ spwd->sp_inact < time(0)) {
printf("Your account has been inactive too long.\n");
sleepexit(1);
}
if (!quiet) {
printf("Last login: %.*s ",
24-5, ctime(&ll.ll_time));
if (*ll.ll_host != '\0') {
printf("from %.*s\n",
(int)sizeof(ll.ll_host),
ll.ll_host);
} else
printf("on %.*s\n",
(int)sizeof(ll.ll_line),
ll.ll_line);
}
}
lseek(fd, (off_t)pwd->pw_uid * sizeof(ll), SEEK_SET);
#else /* SYSV_SHADOW */
if (!quiet) {
if (read(fd, &ll, sizeof(ll)) == sizeof(ll) &&
ll.ll_time != 0) {
printf("Last login: %.*s ",
24-5, ctime(&ll.ll_time));
if (*ll.ll_host != '\0')
printf("from %.*s\n",
(int)sizeof(ll.ll_host),
ll.ll_host);
else
printf("on %.*s\n",
(int)sizeof(ll.ll_line),
ll.ll_line);
}
lseek(fd, (off_t)pwd->pw_uid * sizeof(ll), SEEK_SET);
}
#endif /* SYSV_SHADOW */
memset(&ll, 0, sizeof(ll));
time(&ll.ll_time);
strncpy(ll.ll_line, tty, sizeof(ll.ll_line));
if (hostname)
strncpy(ll.ll_host, hostname, sizeof(ll.ll_host));
write(fd, &ll, sizeof(ll));
close(fd);
}
#endif /* DOLASTLOG */
}
static void
badlogin(char *name)
{
if (failures == 0)
return;
if (hostname) {
syslog(LOG_NOTICE, "%d LOGIN FAILURE%s FROM %s",
failures, failures > 1 ? "S" : "", hostname);
syslog(LOG_AUTHPRIV|LOG_NOTICE,
"%d LOGIN FAILURE%s FROM %s, %s",
failures, failures > 1 ? "S" : "", hostname, name);
} else {
syslog(LOG_NOTICE, "%d LOGIN FAILURE%s ON %s",
failures, failures > 1 ? "S" : "", tty);
syslog(LOG_AUTHPRIV|LOG_NOTICE,
"%d LOGIN FAILURE%s ON %s, %s",
failures, failures > 1 ? "S" : "", tty, name);
}
}
#undef UNKNOWN
#define UNKNOWN "su"
static char *
stypeof(char *ttyid)
{
/* TERM is probably a better guess than anything else. */
char *term = getenv("TERM");
if (term != 0 && term[0] != 0)
return term;
{
#ifndef HAVE_TTYENT_H
return UNKNOWN;
#else
struct ttyent *t;
return (ttyid && (t = getttynam(ttyid)) ? t->ty_type : UNKNOWN);
#endif
}
}
static void
xgetstr(char *buf, int cnt, char *err)
{
char ch;
do {
if (read(0, &ch, sizeof(ch)) != sizeof(ch))
exit(1);
if (--cnt < 0) {
fprintf(stderr, "%s too long\r\n", err);
sleepexit(1);
}
*buf++ = ch;
} while (ch);
}
/*
* Some old rlogind's unknowingly pass remuser, locuser and
* terminal_type/speed so we need to take care of that part of the
* protocol here. Also, we can't make a getpeername(2) on the socket
* so we have to trust that rlogind resolved the name correctly.
*/
static int
doremotelogin(char *host)
{
int code;
char *cp;
xgetstr(rusername, sizeof (rusername), "remuser");
xgetstr(lusername, sizeof (lusername), "locuser");
xgetstr(term, sizeof(term), "Terminal type");
cp = strchr(term, '/');
if (cp != 0)
*cp = 0; /* For now ignore speed/bg */
pwd = k_getpwnam(lusername);
if (pwd == NULL)
return(-1);
code = ruserok(host, (pwd->pw_uid == 0), rusername, lusername);
if (code == 0)
syslog(LOG_NOTICE,
"Warning: An old rlogind accepted login probably from host %s",
host);
return(code);
}
void
sleepexit(int eval)
{
sleep(5);
exit(eval);
}