b7aa600c41
I have worked hard to reduce diffs against the vendor branch. One notable change in that respect is that we no longer prefer DSA over RSA - the reasons for doing so went away years ago. This may cause some surprises, as ssh will warn about unknown host keys even for hosts whose keys haven't changed. MFC after: 6 weeks
818 lines
20 KiB
C
818 lines
20 KiB
C
/*
|
|
* $Id: bsd-cray.c,v 1.17 2007/08/15 09:17:43 dtucker Exp $
|
|
*
|
|
* bsd-cray.c
|
|
*
|
|
* Copyright (c) 2002, Cray Inc. (Wendy Palm <wendyp@cray.com>)
|
|
* Significant portions provided by
|
|
* Wayne Schroeder, SDSC <schroeder@sdsc.edu>
|
|
* William Jones, UTexas <jones@tacc.utexas.edu>
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
* Created: Apr 22 16.34:00 2002 wp
|
|
*
|
|
* This file contains functions required for proper execution
|
|
* on UNICOS systems.
|
|
*
|
|
*/
|
|
#ifdef _UNICOS
|
|
|
|
#include <udb.h>
|
|
#include <tmpdir.h>
|
|
#include <unistd.h>
|
|
#include <sys/category.h>
|
|
#include <utmp.h>
|
|
#include <sys/jtab.h>
|
|
#include <signal.h>
|
|
#include <sys/priv.h>
|
|
#include <sys/secparm.h>
|
|
#include <sys/tfm.h>
|
|
#include <sys/usrv.h>
|
|
#include <sys/sysv.h>
|
|
#include <sys/sectab.h>
|
|
#include <sys/secstat.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/session.h>
|
|
#include <stdarg.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <pwd.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
#include <ia.h>
|
|
#include <urm.h>
|
|
#include "ssh.h"
|
|
|
|
#include "includes.h"
|
|
#include "sys/types.h"
|
|
|
|
#ifndef HAVE_STRUCT_SOCKADDR_STORAGE
|
|
# define _SS_MAXSIZE 128 /* Implementation specific max size */
|
|
# define _SS_PADSIZE (_SS_MAXSIZE - sizeof (struct sockaddr))
|
|
|
|
# define ss_family ss_sa.sa_family
|
|
#endif /* !HAVE_STRUCT_SOCKADDR_STORAGE */
|
|
|
|
#ifndef IN6_IS_ADDR_LOOPBACK
|
|
# define IN6_IS_ADDR_LOOPBACK(a) \
|
|
(((u_int32_t *) (a))[0] == 0 && ((u_int32_t *) (a))[1] == 0 && \
|
|
((u_int32_t *) (a))[2] == 0 && ((u_int32_t *) (a))[3] == htonl (1))
|
|
#endif /* !IN6_IS_ADDR_LOOPBACK */
|
|
|
|
#ifndef AF_INET6
|
|
/* Define it to something that should never appear */
|
|
#define AF_INET6 AF_MAX
|
|
#endif
|
|
|
|
#include "log.h"
|
|
#include "servconf.h"
|
|
#include "bsd-cray.h"
|
|
|
|
#define MAXACID 80
|
|
|
|
extern ServerOptions options;
|
|
|
|
char cray_tmpdir[TPATHSIZ + 1]; /* job TMPDIR path */
|
|
|
|
struct sysv sysv; /* system security structure */
|
|
struct usrv usrv; /* user security structure */
|
|
|
|
/*
|
|
* Functions.
|
|
*/
|
|
void cray_retain_utmp(struct utmp *, int);
|
|
void cray_delete_tmpdir(char *, int, uid_t);
|
|
void cray_init_job(struct passwd *);
|
|
void cray_set_tmpdir(struct utmp *);
|
|
void cray_login_failure(char *, int);
|
|
int cray_setup(uid_t, char *, const char *);
|
|
int cray_access_denied(char *);
|
|
|
|
void
|
|
cray_login_failure(char *username, int errcode)
|
|
{
|
|
struct udb *ueptr; /* UDB pointer for username */
|
|
ia_failure_t fsent; /* ia_failure structure */
|
|
ia_failure_ret_t fret; /* ia_failure return stuff */
|
|
struct jtab jtab; /* job table structure */
|
|
int jid = 0; /* job id */
|
|
|
|
if ((jid = getjtab(&jtab)) < 0)
|
|
debug("cray_login_failure(): getjtab error");
|
|
|
|
getsysudb();
|
|
if ((ueptr = getudbnam(username)) == UDB_NULL)
|
|
debug("cray_login_failure(): getudbname() returned NULL");
|
|
endudb();
|
|
|
|
memset(&fsent, '\0', sizeof(fsent));
|
|
fsent.revision = 0;
|
|
fsent.uname = username;
|
|
fsent.host = (char *)get_canonical_hostname(options.use_dns);
|
|
fsent.ttyn = "sshd";
|
|
fsent.caller = IA_SSHD;
|
|
fsent.flags = IA_INTERACTIVE;
|
|
fsent.ueptr = ueptr;
|
|
fsent.jid = jid;
|
|
fsent.errcode = errcode;
|
|
fsent.pwdp = NULL;
|
|
fsent.exitcode = 0; /* dont exit in ia_failure() */
|
|
|
|
fret.revision = 0;
|
|
fret.normal = 0;
|
|
|
|
/*
|
|
* Call ia_failure because of an login failure.
|
|
*/
|
|
ia_failure(&fsent, &fret);
|
|
}
|
|
|
|
/*
|
|
* Cray access denied
|
|
*/
|
|
int
|
|
cray_access_denied(char *username)
|
|
{
|
|
struct udb *ueptr; /* UDB pointer for username */
|
|
int errcode; /* IA errorcode */
|
|
|
|
errcode = 0;
|
|
getsysudb();
|
|
if ((ueptr = getudbnam(username)) == UDB_NULL)
|
|
debug("cray_login_failure(): getudbname() returned NULL");
|
|
endudb();
|
|
|
|
if (ueptr != NULL && ueptr->ue_disabled)
|
|
errcode = IA_DISABLED;
|
|
if (errcode)
|
|
cray_login_failure(username, errcode);
|
|
|
|
return (errcode);
|
|
}
|
|
|
|
/*
|
|
* record_failed_login: generic "login failed" interface function
|
|
*/
|
|
void
|
|
record_failed_login(const char *user, const char *hostname, const char *ttyname)
|
|
{
|
|
cray_login_failure((char *)user, IA_UDBERR);
|
|
}
|
|
|
|
int
|
|
cray_setup (uid_t uid, char *username, const char *command)
|
|
{
|
|
extern struct udb *getudb();
|
|
extern char *setlimits();
|
|
|
|
int err; /* error return */
|
|
time_t system_time; /* current system clock */
|
|
time_t expiration_time; /* password expiration time */
|
|
int maxattempts; /* maximum no. of failed login attempts */
|
|
int SecureSys; /* unicos security flag */
|
|
int minslevel = 0; /* system minimum security level */
|
|
int i, j;
|
|
int valid_acct = -1; /* flag for reading valid acct */
|
|
char acct_name[MAXACID] = { "" }; /* used to read acct name */
|
|
struct jtab jtab; /* Job table struct */
|
|
struct udb ue; /* udb entry for logging-in user */
|
|
struct udb *up; /* pointer to UDB entry */
|
|
struct secstat secinfo; /* file security attributes */
|
|
struct servprov init_info; /* used for sesscntl() call */
|
|
int jid; /* job ID */
|
|
int pid; /* process ID */
|
|
char *sr; /* status return from setlimits() */
|
|
char *ttyn = NULL; /* ttyname or command name*/
|
|
char hostname[MAXHOSTNAMELEN];
|
|
/* passwd stuff for ia_user */
|
|
passwd_t pwdacm, pwddialup, pwdudb, pwdwal, pwddce;
|
|
ia_user_ret_t uret; /* stuff returned from ia_user */
|
|
ia_user_t usent; /* ia_user main structure */
|
|
int ia_rcode; /* ia_user return code */
|
|
ia_failure_t fsent; /* ia_failure structure */
|
|
ia_failure_ret_t fret; /* ia_failure return stuff */
|
|
ia_success_t ssent; /* ia_success structure */
|
|
ia_success_ret_t sret; /* ia_success return stuff */
|
|
int ia_mlsrcode; /* ia_mlsuser return code */
|
|
int secstatrc; /* [f]secstat return code */
|
|
|
|
if (SecureSys = (int)sysconf(_SC_CRAY_SECURE_SYS)) {
|
|
getsysv(&sysv, sizeof(struct sysv));
|
|
minslevel = sysv.sy_minlvl;
|
|
if (getusrv(&usrv) < 0)
|
|
fatal("getusrv() failed, errno = %d", errno);
|
|
}
|
|
hostname[0] = '\0';
|
|
strlcpy(hostname,
|
|
(char *)get_canonical_hostname(options.use_dns),
|
|
MAXHOSTNAMELEN);
|
|
/*
|
|
* Fetch user's UDB entry.
|
|
*/
|
|
getsysudb();
|
|
if ((up = getudbnam(username)) == UDB_NULL)
|
|
fatal("cannot fetch user's UDB entry");
|
|
|
|
/*
|
|
* Prevent any possible fudging so perform a data
|
|
* safety check and compare the supplied uid against
|
|
* the udb's uid.
|
|
*/
|
|
if (up->ue_uid != uid)
|
|
fatal("IA uid missmatch");
|
|
endudb();
|
|
|
|
if ((jid = getjtab(&jtab)) < 0) {
|
|
debug("getjtab");
|
|
return(-1);
|
|
}
|
|
pid = getpid();
|
|
ttyn = ttyname(0);
|
|
if (SecureSys) {
|
|
if (ttyn != NULL)
|
|
secstatrc = secstat(ttyn, &secinfo);
|
|
else
|
|
secstatrc = fsecstat(1, &secinfo);
|
|
|
|
if (secstatrc == 0)
|
|
debug("[f]secstat() successful");
|
|
else
|
|
fatal("[f]secstat() error, rc = %d", secstatrc);
|
|
}
|
|
if ((ttyn == NULL) && ((char *)command != NULL))
|
|
ttyn = (char *)command;
|
|
/*
|
|
* Initialize all structures to call ia_user
|
|
*/
|
|
usent.revision = 0;
|
|
usent.uname = username;
|
|
usent.host = hostname;
|
|
usent.ttyn = ttyn;
|
|
usent.caller = IA_SSHD;
|
|
usent.pswdlist = &pwdacm;
|
|
usent.ueptr = &ue;
|
|
usent.flags = IA_INTERACTIVE | IA_FFLAG;
|
|
pwdacm.atype = IA_SECURID;
|
|
pwdacm.pwdp = NULL;
|
|
pwdacm.next = &pwdudb;
|
|
|
|
pwdudb.atype = IA_UDB;
|
|
pwdudb.pwdp = NULL;
|
|
pwdudb.next = &pwddce;
|
|
|
|
pwddce.atype = IA_DCE;
|
|
pwddce.pwdp = NULL;
|
|
pwddce.next = &pwddialup;
|
|
|
|
pwddialup.atype = IA_DIALUP;
|
|
pwddialup.pwdp = NULL;
|
|
/* pwddialup.next = &pwdwal; */
|
|
pwddialup.next = NULL;
|
|
|
|
pwdwal.atype = IA_WAL;
|
|
pwdwal.pwdp = NULL;
|
|
pwdwal.next = NULL;
|
|
|
|
uret.revision = 0;
|
|
uret.pswd = NULL;
|
|
uret.normal = 0;
|
|
|
|
ia_rcode = ia_user(&usent, &uret);
|
|
switch (ia_rcode) {
|
|
/*
|
|
* These are acceptable return codes from ia_user()
|
|
*/
|
|
case IA_UDBWEEK: /* Password Expires in 1 week */
|
|
expiration_time = ue.ue_pwage.time + ue.ue_pwage.maxage;
|
|
printf ("WARNING - your current password will expire %s\n",
|
|
ctime((const time_t *)&expiration_time));
|
|
break;
|
|
case IA_UDBEXPIRED:
|
|
if (ttyname(0) != NULL) {
|
|
/* Force a password change */
|
|
printf("Your password has expired; Choose a new one.\n");
|
|
execl("/bin/passwd", "passwd", username, 0);
|
|
exit(9);
|
|
}
|
|
break;
|
|
case IA_NORMAL: /* Normal Return Code */
|
|
break;
|
|
case IA_BACKDOOR:
|
|
/* XXX: can we memset it to zero here so save some of this */
|
|
strlcpy(ue.ue_name, "root", sizeof(ue.ue_name));
|
|
strlcpy(ue.ue_dir, "/", sizeof(ue.ue_dir));
|
|
strlcpy(ue.ue_shell, "/bin/sh", sizeof(ue.ue_shell));
|
|
|
|
ue.ue_passwd[0] = '\0';
|
|
ue.ue_age[0] = '\0';
|
|
ue.ue_comment[0] = '\0';
|
|
ue.ue_loghost[0] = '\0';
|
|
ue.ue_logline[0] = '\0';
|
|
|
|
ue.ue_uid = -1;
|
|
ue.ue_nice[UDBRC_INTER] = 0;
|
|
|
|
for (i = 0; i < MAXVIDS; i++)
|
|
ue.ue_gids[i] = 0;
|
|
|
|
ue.ue_logfails = 0;
|
|
ue.ue_minlvl = ue.ue_maxlvl = ue.ue_deflvl = minslevel;
|
|
ue.ue_defcomps = 0;
|
|
ue.ue_comparts = 0;
|
|
ue.ue_permits = 0;
|
|
ue.ue_trap = 0;
|
|
ue.ue_disabled = 0;
|
|
ue.ue_logtime = 0;
|
|
break;
|
|
case IA_CONSOLE: /* Superuser not from Console */
|
|
case IA_TRUSTED: /* Trusted user */
|
|
if (options.permit_root_login > PERMIT_NO)
|
|
break; /* Accept root login */
|
|
default:
|
|
/*
|
|
* These are failed return codes from ia_user()
|
|
*/
|
|
switch (ia_rcode)
|
|
{
|
|
case IA_BADAUTH:
|
|
printf("Bad authorization, access denied.\n");
|
|
break;
|
|
case IA_DISABLED:
|
|
printf("Your login has been disabled. Contact the system ");
|
|
printf("administrator for assistance.\n");
|
|
break;
|
|
case IA_GETSYSV:
|
|
printf("getsysv() failed - errno = %d\n", errno);
|
|
break;
|
|
case IA_MAXLOGS:
|
|
printf("Maximum number of failed login attempts exceeded.\n");
|
|
printf("Access denied.\n");
|
|
break;
|
|
case IA_UDBPWDNULL:
|
|
if (SecureSys)
|
|
printf("NULL Password not allowed on MLS systems.\n");
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
/*
|
|
* Authentication failed.
|
|
*/
|
|
printf("sshd: Login incorrect, (0%o)\n",
|
|
ia_rcode-IA_ERRORCODE);
|
|
|
|
/*
|
|
* Initialize structure for ia_failure
|
|
* which will exit.
|
|
*/
|
|
fsent.revision = 0;
|
|
fsent.uname = username;
|
|
fsent.host = hostname;
|
|
fsent.ttyn = ttyn;
|
|
fsent.caller = IA_SSHD;
|
|
fsent.flags = IA_INTERACTIVE;
|
|
fsent.ueptr = &ue;
|
|
fsent.jid = jid;
|
|
fsent.errcode = ia_rcode;
|
|
fsent.pwdp = uret.pswd;
|
|
fsent.exitcode = 1;
|
|
|
|
fret.revision = 0;
|
|
fret.normal = 0;
|
|
|
|
/*
|
|
* Call ia_failure because of an IA failure.
|
|
* There is no return because ia_failure exits.
|
|
*/
|
|
ia_failure(&fsent, &fret);
|
|
|
|
exit(1);
|
|
}
|
|
|
|
ia_mlsrcode = IA_NORMAL;
|
|
if (SecureSys) {
|
|
debug("calling ia_mlsuser()");
|
|
ia_mlsrcode = ia_mlsuser(&ue, &secinfo, &usrv, NULL, 0);
|
|
}
|
|
if (ia_mlsrcode != IA_NORMAL) {
|
|
printf("sshd: Login incorrect, (0%o)\n",
|
|
ia_mlsrcode-IA_ERRORCODE);
|
|
/*
|
|
* Initialize structure for ia_failure
|
|
* which will exit.
|
|
*/
|
|
fsent.revision = 0;
|
|
fsent.uname = username;
|
|
fsent.host = hostname;
|
|
fsent.ttyn = ttyn;
|
|
fsent.caller = IA_SSHD;
|
|
fsent.flags = IA_INTERACTIVE;
|
|
fsent.ueptr = &ue;
|
|
fsent.jid = jid;
|
|
fsent.errcode = ia_mlsrcode;
|
|
fsent.pwdp = uret.pswd;
|
|
fsent.exitcode = 1;
|
|
fret.revision = 0;
|
|
fret.normal = 0;
|
|
|
|
/*
|
|
* Call ia_failure because of an IA failure.
|
|
* There is no return because ia_failure exits.
|
|
*/
|
|
ia_failure(&fsent,&fret);
|
|
exit(1);
|
|
}
|
|
|
|
/* Provide login status information */
|
|
if (options.print_lastlog && ue.ue_logtime != 0) {
|
|
printf("Last successful login was : %.*s ", 19,
|
|
(char *)ctime(&ue.ue_logtime));
|
|
|
|
if (*ue.ue_loghost != '\0') {
|
|
printf("from %.*s\n", sizeof(ue.ue_loghost),
|
|
ue.ue_loghost);
|
|
} else {
|
|
printf("on %.*s\n", sizeof(ue.ue_logline),
|
|
ue.ue_logline);
|
|
}
|
|
|
|
if (SecureSys && (ue.ue_logfails != 0)) {
|
|
printf(" followed by %d failed attempts\n",
|
|
ue.ue_logfails);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Call ia_success to process successful I/A.
|
|
*/
|
|
ssent.revision = 0;
|
|
ssent.uname = username;
|
|
ssent.host = hostname;
|
|
ssent.ttyn = ttyn;
|
|
ssent.caller = IA_SSHD;
|
|
ssent.flags = IA_INTERACTIVE;
|
|
ssent.ueptr = &ue;
|
|
ssent.jid = jid;
|
|
ssent.errcode = ia_rcode;
|
|
ssent.us = NULL;
|
|
ssent.time = 1; /* Set ue_logtime */
|
|
|
|
sret.revision = 0;
|
|
sret.normal = 0;
|
|
|
|
ia_success(&ssent, &sret);
|
|
|
|
/*
|
|
* Query for account, iff > 1 valid acid & askacid permbit
|
|
*/
|
|
if (((ue.ue_permbits & PERMBITS_ACCTID) ||
|
|
(ue.ue_acids[0] >= 0) && (ue.ue_acids[1] >= 0)) &&
|
|
ue.ue_permbits & PERMBITS_ASKACID) {
|
|
if (ttyname(0) != NULL) {
|
|
debug("cray_setup: ttyname true case, %.100s", ttyname);
|
|
while (valid_acct == -1) {
|
|
printf("Account (? for available accounts)"
|
|
" [%s]: ", acid2nam(ue.ue_acids[0]));
|
|
fgets(acct_name, MAXACID, stdin);
|
|
switch (acct_name[0]) {
|
|
case EOF:
|
|
exit(0);
|
|
break;
|
|
case '\0':
|
|
valid_acct = ue.ue_acids[0];
|
|
strlcpy(acct_name, acid2nam(valid_acct), MAXACID);
|
|
break;
|
|
case '?':
|
|
/* Print the list 3 wide */
|
|
for (i = 0, j = 0; i < MAXVIDS; i++) {
|
|
if (ue.ue_acids[i] == -1) {
|
|
printf("\n");
|
|
break;
|
|
}
|
|
if (++j == 4) {
|
|
j = 1;
|
|
printf("\n");
|
|
}
|
|
printf(" %s",
|
|
acid2nam(ue.ue_acids[i]));
|
|
}
|
|
if (ue.ue_permbits & PERMBITS_ACCTID) {
|
|
printf("\"acctid\" permbit also allows"
|
|
" you to select any valid "
|
|
"account name.\n");
|
|
}
|
|
printf("\n");
|
|
break;
|
|
default:
|
|
valid_acct = nam2acid(acct_name);
|
|
if (valid_acct == -1)
|
|
printf(
|
|
"Account id not found for"
|
|
" account name \"%s\"\n\n",
|
|
acct_name);
|
|
break;
|
|
}
|
|
/*
|
|
* If an account was given, search the user's
|
|
* acids array to verify they can use this account.
|
|
*/
|
|
if ((valid_acct != -1) &&
|
|
!(ue.ue_permbits & PERMBITS_ACCTID)) {
|
|
for (i = 0; i < MAXVIDS; i++) {
|
|
if (ue.ue_acids[i] == -1)
|
|
break;
|
|
if (valid_acct == ue.ue_acids[i])
|
|
break;
|
|
}
|
|
if (i == MAXVIDS ||
|
|
ue.ue_acids[i] == -1) {
|
|
fprintf(stderr, "Cannot set"
|
|
" account name to "
|
|
"\"%s\", permission "
|
|
"denied\n\n", acct_name);
|
|
valid_acct = -1;
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
/*
|
|
* The client isn't connected to a terminal and can't
|
|
* respond to an acid prompt. Use default acid.
|
|
*/
|
|
debug("cray_setup: ttyname false case, %.100s",
|
|
ttyname);
|
|
valid_acct = ue.ue_acids[0];
|
|
}
|
|
} else {
|
|
/*
|
|
* The user doesn't have the askacid permbit set or
|
|
* only has one valid account to use.
|
|
*/
|
|
valid_acct = ue.ue_acids[0];
|
|
}
|
|
if (acctid(0, valid_acct) < 0) {
|
|
printf ("Bad account id: %d\n", valid_acct);
|
|
exit(1);
|
|
}
|
|
|
|
/*
|
|
* Now set shares, quotas, limits, including CPU time for the
|
|
* (interactive) job and process, and set up permissions
|
|
* (for chown etc), etc.
|
|
*/
|
|
if (setshares(ue.ue_uid, valid_acct, printf, 0, 0)) {
|
|
printf("Unable to give %d shares to <%s>(%d/%d)\n",
|
|
ue.ue_shares, ue.ue_name, ue.ue_uid, valid_acct);
|
|
exit(1);
|
|
}
|
|
|
|
sr = setlimits(username, C_PROC, pid, UDBRC_INTER);
|
|
if (sr != NULL) {
|
|
debug("%.200s", sr);
|
|
exit(1);
|
|
}
|
|
sr = setlimits(username, C_JOB, jid, UDBRC_INTER);
|
|
if (sr != NULL) {
|
|
debug("%.200s", sr);
|
|
exit(1);
|
|
}
|
|
/*
|
|
* Place the service provider information into
|
|
* the session table (Unicos) or job table (Unicos/mk).
|
|
* There exist double defines for the job/session table in
|
|
* unicos/mk (jtab.h) so no need for a compile time switch.
|
|
*/
|
|
memset(&init_info, '\0', sizeof(init_info));
|
|
init_info.s_sessinit.si_id = URM_SPT_LOGIN;
|
|
init_info.s_sessinit.si_pid = getpid();
|
|
init_info.s_sessinit.si_sid = jid;
|
|
sesscntl(0, S_SETSERVPO, (int)&init_info);
|
|
|
|
/*
|
|
* Set user and controlling tty security attributes.
|
|
*/
|
|
if (SecureSys) {
|
|
if (setusrv(&usrv) == -1) {
|
|
debug("setusrv() failed, errno = %d",errno);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* The rc.* and /etc/sdaemon methods of starting a program on unicos/unicosmk
|
|
* can have pal privileges that sshd can inherit which
|
|
* could allow a user to su to root with out a password.
|
|
* This subroutine clears all privileges.
|
|
*/
|
|
void
|
|
drop_cray_privs()
|
|
{
|
|
#if defined(_SC_CRAY_PRIV_SU)
|
|
priv_proc_t *privstate;
|
|
int result;
|
|
extern int priv_set_proc();
|
|
extern priv_proc_t *priv_init_proc();
|
|
|
|
/*
|
|
* If ether of theses two flags are not set
|
|
* then don't allow this version of ssh to run.
|
|
*/
|
|
if (!sysconf(_SC_CRAY_PRIV_SU))
|
|
fatal("Not PRIV_SU system.");
|
|
if (!sysconf(_SC_CRAY_POSIX_PRIV))
|
|
fatal("Not POSIX_PRIV.");
|
|
|
|
debug("Setting MLS labels.");;
|
|
|
|
if (sysconf(_SC_CRAY_SECURE_MAC)) {
|
|
usrv.sv_minlvl = SYSLOW;
|
|
usrv.sv_actlvl = SYSHIGH;
|
|
usrv.sv_maxlvl = SYSHIGH;
|
|
} else {
|
|
usrv.sv_minlvl = sysv.sy_minlvl;
|
|
usrv.sv_actlvl = sysv.sy_minlvl;
|
|
usrv.sv_maxlvl = sysv.sy_maxlvl;
|
|
}
|
|
usrv.sv_actcmp = 0;
|
|
usrv.sv_valcmp = sysv.sy_valcmp;
|
|
|
|
usrv.sv_intcat = TFM_SYSTEM;
|
|
usrv.sv_valcat |= (TFM_SYSTEM | TFM_SYSFILE);
|
|
|
|
if (setusrv(&usrv) < 0) {
|
|
fatal("%s(%d): setusrv(): %s", __FILE__, __LINE__,
|
|
strerror(errno));
|
|
}
|
|
|
|
if ((privstate = priv_init_proc()) != NULL) {
|
|
result = priv_set_proc(privstate);
|
|
if (result != 0 ) {
|
|
fatal("%s(%d): priv_set_proc(): %s",
|
|
__FILE__, __LINE__, strerror(errno));
|
|
}
|
|
priv_free_proc(privstate);
|
|
}
|
|
debug ("Privileges should be cleared...");
|
|
#else
|
|
/* XXX: do this differently */
|
|
# error Cray systems must be run with _SC_CRAY_PRIV_SU on!
|
|
#endif
|
|
}
|
|
|
|
|
|
/*
|
|
* Retain utmp/wtmp information - used by cray accounting.
|
|
*/
|
|
void
|
|
cray_retain_utmp(struct utmp *ut, int pid)
|
|
{
|
|
int fd;
|
|
struct utmp utmp;
|
|
|
|
if ((fd = open(UTMP_FILE, O_RDONLY)) != -1) {
|
|
/* XXX use atomicio */
|
|
while (read(fd, (char *)&utmp, sizeof(utmp)) == sizeof(utmp)) {
|
|
if (pid == utmp.ut_pid) {
|
|
ut->ut_jid = utmp.ut_jid;
|
|
strncpy(ut->ut_tpath, utmp.ut_tpath, sizeof(utmp.ut_tpath));
|
|
strncpy(ut->ut_host, utmp.ut_host, sizeof(utmp.ut_host));
|
|
strncpy(ut->ut_name, utmp.ut_name, sizeof(utmp.ut_name));
|
|
break;
|
|
}
|
|
}
|
|
close(fd);
|
|
} else
|
|
fatal("Unable to open utmp file");
|
|
}
|
|
|
|
/*
|
|
* tmpdir support.
|
|
*/
|
|
|
|
/*
|
|
* find and delete jobs tmpdir.
|
|
*/
|
|
void
|
|
cray_delete_tmpdir(char *login, int jid, uid_t uid)
|
|
{
|
|
static char jtmp[TPATHSIZ];
|
|
struct stat statbuf;
|
|
int child, c, wstat;
|
|
|
|
for (c = 'a'; c <= 'z'; c++) {
|
|
snprintf(jtmp, TPATHSIZ, "%s/jtmp.%06d%c", JTMPDIR, jid, c);
|
|
if (stat(jtmp, &statbuf) == 0 && statbuf.st_uid == uid)
|
|
break;
|
|
}
|
|
|
|
if (c > 'z')
|
|
return;
|
|
|
|
if ((child = fork()) == 0) {
|
|
execl(CLEANTMPCMD, CLEANTMPCMD, login, jtmp, (char *)NULL);
|
|
fatal("cray_delete_tmpdir: execl of CLEANTMPCMD failed");
|
|
}
|
|
|
|
while (waitpid(child, &wstat, 0) == -1 && errno == EINTR)
|
|
;
|
|
}
|
|
|
|
/*
|
|
* Remove tmpdir on job termination.
|
|
*/
|
|
void
|
|
cray_job_termination_handler(int sig)
|
|
{
|
|
int jid;
|
|
char *login = NULL;
|
|
struct jtab jtab;
|
|
|
|
if ((jid = waitjob(&jtab)) == -1 ||
|
|
(login = uid2nam(jtab.j_uid)) == NULL)
|
|
return;
|
|
|
|
cray_delete_tmpdir(login, jid, jtab.j_uid);
|
|
}
|
|
|
|
/*
|
|
* Set job id and create tmpdir directory.
|
|
*/
|
|
void
|
|
cray_init_job(struct passwd *pw)
|
|
{
|
|
int jid;
|
|
int c;
|
|
|
|
jid = setjob(pw->pw_uid, WJSIGNAL);
|
|
if (jid < 0)
|
|
fatal("System call setjob failure");
|
|
|
|
for (c = 'a'; c <= 'z'; c++) {
|
|
snprintf(cray_tmpdir, TPATHSIZ, "%s/jtmp.%06d%c", JTMPDIR, jid, c);
|
|
if (mkdir(cray_tmpdir, JTMPMODE) != 0)
|
|
continue;
|
|
if (chown(cray_tmpdir, pw->pw_uid, pw->pw_gid) != 0) {
|
|
rmdir(cray_tmpdir);
|
|
continue;
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (c > 'z')
|
|
cray_tmpdir[0] = '\0';
|
|
}
|
|
|
|
void
|
|
cray_set_tmpdir(struct utmp *ut)
|
|
{
|
|
int jid;
|
|
struct jtab jbuf;
|
|
|
|
if ((jid = getjtab(&jbuf)) < 0)
|
|
return;
|
|
|
|
/*
|
|
* Set jid and tmpdir in utmp record.
|
|
*/
|
|
ut->ut_jid = jid;
|
|
strncpy(ut->ut_tpath, cray_tmpdir, TPATHSIZ);
|
|
}
|
|
#endif /* UNICOS */
|
|
|
|
#ifdef _UNICOSMP
|
|
#include <pwd.h>
|
|
/*
|
|
* Set job id and create tmpdir directory.
|
|
*/
|
|
void
|
|
cray_init_job(struct passwd *pw)
|
|
{
|
|
initrm_silent(pw->pw_uid);
|
|
return;
|
|
}
|
|
#endif /* _UNICOSMP */
|