pam: add option to not prompt for password if it's set to empty
Add a new option to pam_unix(8), "emptyok", which makes it not prompt for password, if it's set to an empty one. It is similar to "nullok", which makes it not prompt for password if the hash itself is empty. Reviewed By: markj Sponsored By: NetApp, Inc. Sponsored By: Klara, Inc. Differential Revision: https://reviews.freebsd.org/D27569
This commit is contained in:
parent
ab899f8937
commit
bfd8b9b826
@ -37,6 +37,7 @@
|
|||||||
* Common option names
|
* Common option names
|
||||||
*/
|
*/
|
||||||
#define PAM_OPT_NULLOK "nullok"
|
#define PAM_OPT_NULLOK "nullok"
|
||||||
|
#define PAM_OPT_EMPTYOK "emptyok"
|
||||||
#define PAM_OPT_AUTH_AS_SELF "auth_as_self"
|
#define PAM_OPT_AUTH_AS_SELF "auth_as_self"
|
||||||
#define PAM_OPT_ECHO_PASS "echo_pass"
|
#define PAM_OPT_ECHO_PASS "echo_pass"
|
||||||
#define PAM_OPT_DEBUG "debug"
|
#define PAM_OPT_DEBUG "debug"
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
.\"
|
.\"
|
||||||
.\" $FreeBSD$
|
.\" $FreeBSD$
|
||||||
.\"
|
.\"
|
||||||
.Dd June 20, 2009
|
.Dd April 3, 2020
|
||||||
.Dt PAM_UNIX 8
|
.Dt PAM_UNIX 8
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -116,6 +116,16 @@ privileges), the
|
|||||||
option may cause
|
option may cause
|
||||||
.Nm
|
.Nm
|
||||||
to allow any user to log in with any password.
|
to allow any user to log in with any password.
|
||||||
|
.It Cm emptyok
|
||||||
|
If the password database contains the password for the entity being
|
||||||
|
authenticated, but the password matches an empty string,
|
||||||
|
then this option will forgo password prompting, and
|
||||||
|
silently allow authentication to succeed.
|
||||||
|
.Pp
|
||||||
|
The difference between this and
|
||||||
|
.Cm nullok
|
||||||
|
is that it avoids prompting for password when the password is set
|
||||||
|
to an empty string, as opposed to not being set.
|
||||||
.It Cm local_pass
|
.It Cm local_pass
|
||||||
Use only the local password database, even if NIS is in use.
|
Use only the local password database, even if NIS is in use.
|
||||||
This will cause an authentication failure if the system is configured
|
This will cause an authentication failure if the system is configured
|
||||||
|
@ -94,6 +94,7 @@ pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
|
|||||||
struct passwd *pwd;
|
struct passwd *pwd;
|
||||||
int retval;
|
int retval;
|
||||||
const char *pass, *user, *realpw, *prompt;
|
const char *pass, *user, *realpw, *prompt;
|
||||||
|
const char *emptypasswd = "";
|
||||||
|
|
||||||
if (openpam_get_option(pamh, PAM_OPT_AUTH_AS_SELF)) {
|
if (openpam_get_option(pamh, PAM_OPT_AUTH_AS_SELF)) {
|
||||||
user = getlogin();
|
user = getlogin();
|
||||||
@ -116,6 +117,15 @@ pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
|
|||||||
PAM_LOG("Password is empty, using fake password");
|
PAM_LOG("Password is empty, using fake password");
|
||||||
realpw = "*";
|
realpw = "*";
|
||||||
}
|
}
|
||||||
|
/*
|
||||||
|
* Check whether the saved password hash matches the one
|
||||||
|
* generated from an empty password - as opposed to empty
|
||||||
|
* saved password hash, which is handled above.
|
||||||
|
*/
|
||||||
|
if (!(flags & PAM_DISALLOW_NULL_AUTHTOK) &&
|
||||||
|
openpam_get_option(pamh, PAM_OPT_EMPTYOK) &&
|
||||||
|
strcmp(crypt(emptypasswd, realpw), realpw) == 0)
|
||||||
|
return (PAM_SUCCESS);
|
||||||
lc = login_getpwclass(pwd);
|
lc = login_getpwclass(pwd);
|
||||||
} else {
|
} else {
|
||||||
PAM_LOG("Doing dummy authentication");
|
PAM_LOG("Doing dummy authentication");
|
||||||
|
Loading…
Reference in New Issue
Block a user