su
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@5989 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
293
appl/su/su.c
Normal file
293
appl/su/su.c
Normal file
@@ -0,0 +1,293 @@
|
||||
/*
|
||||
* Copyright (c) 1999 Kungliga Tekniska H<>gskolan
|
||||
* (Royal Institute of Technology, Stockholm, Sweden).
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
*
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
*
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
*
|
||||
* 3. Neither the name of KTH nor the names of its contributors may be
|
||||
* used to endorse or promote products derived from this software without
|
||||
* specific prior written permission.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
|
||||
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
|
||||
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
||||
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
||||
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
|
||||
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
||||
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */
|
||||
|
||||
#include <config.h>
|
||||
|
||||
RCSID("$Id$");
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
|
||||
#include <syslog.h>
|
||||
|
||||
#include <paths.h>
|
||||
|
||||
#include <pwd.h>
|
||||
|
||||
#include <krb5.h>
|
||||
#include <err.h>
|
||||
#include <roken.h>
|
||||
#include <getarg.h>
|
||||
|
||||
#ifndef _PATH_DEFPATH
|
||||
#define _PATH_DEFPATH "/usr/bin:/bin"
|
||||
#endif
|
||||
|
||||
int kerberos_flag = 1;
|
||||
int csh_f_flag;
|
||||
int full_login;
|
||||
int env_flag;
|
||||
char *kerberos_instance;
|
||||
int help_flag;
|
||||
int version_flag;
|
||||
|
||||
struct getargs args[] = {
|
||||
{ "kerberos", 'K', arg_negative_flag, &kerberos_flag, "don't use kerberos" },
|
||||
{ NULL, 'f', arg_flag, &csh_f_flag, "don't read .cshrc" },
|
||||
{ "full", 'l', arg_flag, &full_login, "simulate full login" },
|
||||
{ NULL, 'm', arg_flag, &env_flag, "leave environment" },
|
||||
{ "instance",'i', arg_string, &kerberos_instance, "root instance to use" },
|
||||
{ "help", 'h', arg_flag, &help_flag },
|
||||
{ "version", 0, arg_flag, &version_flag },
|
||||
};
|
||||
|
||||
|
||||
static void
|
||||
usage (int ret)
|
||||
{
|
||||
arg_printusage (args,
|
||||
sizeof(args)/sizeof(*args),
|
||||
NULL,
|
||||
"[login [shell arguments]]");
|
||||
exit (ret);
|
||||
}
|
||||
|
||||
static struct passwd*
|
||||
make_info(struct passwd *pwd)
|
||||
{
|
||||
struct passwd *info;
|
||||
info = malloc(sizeof(*info));
|
||||
if(info == NULL)
|
||||
return NULL;
|
||||
info->pw_name = strdup(pwd->pw_name);
|
||||
info->pw_passwd = strdup(pwd->pw_passwd);
|
||||
info->pw_uid = pwd->pw_uid;
|
||||
info->pw_gid = pwd->pw_gid;
|
||||
info->pw_dir = strdup(pwd->pw_dir);
|
||||
info->pw_shell = strdup(pwd->pw_shell);
|
||||
if(info->pw_name == NULL || info->pw_passwd == NULL ||
|
||||
info->pw_dir == NULL || info->pw_shell == NULL)
|
||||
return NULL;
|
||||
return info;
|
||||
}
|
||||
|
||||
static int
|
||||
verify_krb5(struct passwd *login_info, struct passwd *su_info)
|
||||
{
|
||||
#ifdef KRB5
|
||||
krb5_context context;
|
||||
krb5_error_code ret;
|
||||
krb5_principal p;
|
||||
krb5_ccache ccache;
|
||||
|
||||
ret = krb5_init_context (&context);
|
||||
if (ret) {
|
||||
#if 0
|
||||
warnx("krb5_init_context failed: %u", ret);
|
||||
#endif
|
||||
return 1;
|
||||
}
|
||||
|
||||
ret = krb5_make_principal(context, &p, NULL,
|
||||
login_info->pw_name, "root", NULL);
|
||||
if(ret)
|
||||
return 1;
|
||||
|
||||
|
||||
if(su_info->pw_uid != 0 || krb5_kuserok(context, p, su_info->pw_name)) {
|
||||
ret = krb5_cc_gen_new(context, &krb5_fcc_ops, &ccache);
|
||||
if(ret) {
|
||||
#if 1
|
||||
krb5_warn(context, ret, "krb5_cc_gen_new");
|
||||
#endif
|
||||
return 1;
|
||||
}
|
||||
ret = krb5_verify_user(context, p, ccache, NULL, TRUE, NULL);
|
||||
if(ret) {
|
||||
krb5_cc_destroy(context, ccache);
|
||||
#if 1
|
||||
krb5_warn(context, ret, "krb5_verify_user");
|
||||
#endif
|
||||
return 1;
|
||||
}
|
||||
{
|
||||
char *s;
|
||||
asprintf(&s, "%s:%s", krb5_cc_get_type(context, ccache),
|
||||
krb5_cc_get_name(context, ccache));
|
||||
setenv("KRB5CCNAME", s, 1);
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int
|
||||
verify_unix(struct passwd *su)
|
||||
{
|
||||
char prompt[128];
|
||||
char pw_buf[1024];
|
||||
char *pw;
|
||||
int r;
|
||||
if(su->pw_passwd != NULL && *su->pw_passwd != '\0') {
|
||||
sprintf(prompt, "%s's password: ", su->pw_name);
|
||||
r = des_read_pw_string(pw_buf, sizeof(pw_buf), prompt, 0);
|
||||
if(r != 0)
|
||||
exit(0);
|
||||
pw = crypt(pw_buf, su->pw_passwd);
|
||||
memset(pw_buf, 0, sizeof(pw_buf));
|
||||
if(strcmp(pw, su->pw_passwd) != 0)
|
||||
return 1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
int
|
||||
main(int argc, char **argv)
|
||||
{
|
||||
int optind = 0;
|
||||
char *su_user;
|
||||
struct passwd *su_info;
|
||||
char *login_user;
|
||||
struct passwd *login_info;
|
||||
|
||||
struct passwd *pwd;
|
||||
|
||||
char *shell;
|
||||
|
||||
int ok = 0;
|
||||
|
||||
set_progname (argv[0]);
|
||||
|
||||
if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optind))
|
||||
usage(1);
|
||||
|
||||
if(help_flag)
|
||||
usage(0);
|
||||
if(version_flag) {
|
||||
print_version(NULL);
|
||||
exit(0);
|
||||
}
|
||||
if(optind >= argc)
|
||||
su_user = "root";
|
||||
else
|
||||
su_user = argv[optind++];
|
||||
|
||||
pwd = k_getpwnam(su_user);
|
||||
if(pwd == NULL)
|
||||
errx (1, "unknown login %s", su_user);
|
||||
if (pwd->pw_uid == 0 && strcmp ("root", su_user) != 0) {
|
||||
syslog (LOG_ALERT, "NIS attack, user %s has uid 0", su_user);
|
||||
errx (1, "unknown login %s", su_user);
|
||||
}
|
||||
su_info = make_info(pwd);
|
||||
|
||||
login_user = getlogin();
|
||||
if(login_user == NULL || (pwd = getpwnam(login_user)) == NULL)
|
||||
pwd = getpwuid(getuid());
|
||||
if(pwd == NULL)
|
||||
errx(1, "who are you?");
|
||||
login_info = make_info(pwd);
|
||||
if(env_flag)
|
||||
shell = login_info->pw_shell;
|
||||
else
|
||||
shell = su_info->pw_shell;
|
||||
if(shell == NULL || *shell == '\0')
|
||||
shell = _PATH_BSHELL;
|
||||
|
||||
if(ok == 0 && verify_krb5(login_info, su_info) == 0)
|
||||
ok++;
|
||||
|
||||
if(ok == 0 && verify_unix(su_info) != 0) {
|
||||
printf("Sorry!\n");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
{
|
||||
char *tty = ttyname (STDERR_FILENO);
|
||||
syslog (LOG_NOTICE | LOG_AUTH, tty ? "%s to %s" : "%s to %s on %s",
|
||||
login_info->pw_name, su_info->pw_name, tty);
|
||||
}
|
||||
|
||||
if(!env_flag) {
|
||||
if(full_login) {
|
||||
char *k = getenv ("KRBTKFILE");
|
||||
char *t = getenv ("TERM");
|
||||
|
||||
environ = malloc (10 * sizeof (char *));
|
||||
if (environ == NULL)
|
||||
err (1, "malloc");
|
||||
environ[0] = NULL;
|
||||
setenv ("PATH", _PATH_DEFPATH, 1);
|
||||
if (t)
|
||||
setenv ("TERM", t, 1);
|
||||
if (k)
|
||||
setenv ("KRBTKFILE", k, 1);
|
||||
if (chdir (pwd->pw_dir) < 0)
|
||||
errx (1, "no directory");
|
||||
}
|
||||
if (full_login || su_info->pw_uid)
|
||||
setenv ("USER", su_info->pw_name, 1);
|
||||
setenv("HOME", su_info->pw_dir, 1);
|
||||
setenv("SHELL", shell, 1);
|
||||
}
|
||||
|
||||
{
|
||||
int i;
|
||||
char **args;
|
||||
char *p;
|
||||
args = malloc((1 + argc - optind + 1) * sizeof(*args));
|
||||
p = strrchr(shell, '/');
|
||||
if(p)
|
||||
p++;
|
||||
else
|
||||
p = shell;
|
||||
if(full_login)
|
||||
asprintf(&args[0], "-%s", p);
|
||||
else
|
||||
args[0] = p;
|
||||
for(i = 1; i < argc - optind + 1; i++)
|
||||
args[i] = argv[optind + i - 1];
|
||||
args[i] = NULL;
|
||||
if(setgid(su_info->pw_gid) < 0)
|
||||
err(1, "setgid");
|
||||
if (initgroups (su_info->pw_name, su_info->pw_gid) < 0)
|
||||
err (1, "initgroups");
|
||||
if(setuid(su_info->pw_uid) < 0)
|
||||
err(1, "setuid");
|
||||
|
||||
execv(shell, args);
|
||||
}
|
||||
|
||||
exit(1);
|
||||
}
|
Reference in New Issue
Block a user