auth_unix.c revision 1.10 1 1.10 lukem /* $NetBSD: auth_unix.c,v 1.10 1998/02/13 05:52:13 lukem Exp $ */
2 1.2 cgd
3 1.1 cgd /*
4 1.1 cgd * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5 1.1 cgd * unrestricted use provided that this legend is included on all tape
6 1.1 cgd * media and as a part of the software program in whole or part. Users
7 1.1 cgd * may copy or modify Sun RPC without charge, but are not authorized
8 1.1 cgd * to license or distribute it to anyone else except as part of a product or
9 1.1 cgd * program developed by the user.
10 1.1 cgd *
11 1.1 cgd * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12 1.1 cgd * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
13 1.1 cgd * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14 1.1 cgd *
15 1.1 cgd * Sun RPC is provided with no support and without any obligation on the
16 1.1 cgd * part of Sun Microsystems, Inc. to assist in its use, correction,
17 1.1 cgd * modification or enhancement.
18 1.1 cgd *
19 1.1 cgd * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20 1.1 cgd * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21 1.1 cgd * OR ANY PART THEREOF.
22 1.1 cgd *
23 1.1 cgd * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24 1.1 cgd * or profits or other special, indirect and consequential damages, even if
25 1.1 cgd * Sun has been advised of the possibility of such damages.
26 1.1 cgd *
27 1.1 cgd * Sun Microsystems, Inc.
28 1.1 cgd * 2550 Garcia Avenue
29 1.1 cgd * Mountain View, California 94043
30 1.1 cgd */
31 1.1 cgd
32 1.5 christos #include <sys/cdefs.h>
33 1.1 cgd #if defined(LIBC_SCCS) && !defined(lint)
34 1.5 christos #if 0
35 1.5 christos static char *sccsid = "@(#)auth_unix.c 1.19 87/08/11 Copyr 1984 Sun Micro";
36 1.5 christos static char *sccsid = "@(#)auth_unix.c 2.2 88/08/01 4.0 RPCSRC";
37 1.5 christos #else
38 1.10 lukem __RCSID("$NetBSD: auth_unix.c,v 1.10 1998/02/13 05:52:13 lukem Exp $");
39 1.5 christos #endif
40 1.1 cgd #endif
41 1.1 cgd
42 1.1 cgd /*
43 1.1 cgd * auth_unix.c, Implements UNIX style authentication parameters.
44 1.1 cgd *
45 1.1 cgd * Copyright (C) 1984, Sun Microsystems, Inc.
46 1.1 cgd *
47 1.1 cgd * The system is very weak. The client uses no encryption for it's
48 1.1 cgd * credentials and only sends null verifiers. The server sends backs
49 1.9 lukem * null verifiers or optionally a verifier that suggests a new short hand
50 1.1 cgd * for the credentials.
51 1.1 cgd *
52 1.1 cgd */
53 1.1 cgd
54 1.6 jtc #include "namespace.h"
55 1.10 lukem
56 1.10 lukem #include <err.h>
57 1.1 cgd #include <stdio.h>
58 1.1 cgd #include <stdlib.h>
59 1.4 cgd #include <string.h>
60 1.4 cgd #include <unistd.h>
61 1.1 cgd
62 1.1 cgd #include <rpc/types.h>
63 1.1 cgd #include <rpc/xdr.h>
64 1.1 cgd #include <rpc/auth.h>
65 1.1 cgd #include <rpc/auth_unix.h>
66 1.6 jtc
67 1.6 jtc #ifdef __weak_alias
68 1.6 jtc __weak_alias(authunix_create,_authunix_create);
69 1.6 jtc __weak_alias(authunix_create_default,_authunix_create_default);
70 1.6 jtc #endif
71 1.1 cgd
72 1.5 christos
73 1.5 christos /* auth_unix.c */
74 1.5 christos static void authunix_nextverf __P((AUTH *));
75 1.5 christos static bool_t authunix_marshal __P((AUTH *, XDR *));
76 1.5 christos static bool_t authunix_validate __P((AUTH *, struct opaque_auth *));
77 1.5 christos static bool_t authunix_refresh __P((AUTH *));
78 1.5 christos static void authunix_destroy __P((AUTH *));
79 1.5 christos static void marshal_new_auth __P((AUTH *));
80 1.5 christos
81 1.1 cgd /*
82 1.1 cgd * Unix authenticator operations vector
83 1.1 cgd */
84 1.1 cgd static struct auth_ops auth_unix_ops = {
85 1.1 cgd authunix_nextverf,
86 1.1 cgd authunix_marshal,
87 1.1 cgd authunix_validate,
88 1.1 cgd authunix_refresh,
89 1.1 cgd authunix_destroy
90 1.1 cgd };
91 1.1 cgd
92 1.1 cgd /*
93 1.1 cgd * This struct is pointed to by the ah_private field of an auth_handle.
94 1.1 cgd */
95 1.1 cgd struct audata {
96 1.1 cgd struct opaque_auth au_origcred; /* original credentials */
97 1.9 lukem struct opaque_auth au_shcred; /* short hand cred */
98 1.9 lukem u_long au_shfaults; /* short hand cache faults */
99 1.1 cgd char au_marshed[MAX_AUTH_BYTES];
100 1.9 lukem u_int au_mpos; /* xdr pos at end of marshed */
101 1.1 cgd };
102 1.1 cgd #define AUTH_PRIVATE(auth) ((struct audata *)auth->ah_private)
103 1.1 cgd
104 1.1 cgd /*
105 1.1 cgd * Create a unix style authenticator.
106 1.1 cgd * Returns an auth handle with the given stuff in it.
107 1.1 cgd */
108 1.1 cgd AUTH *
109 1.1 cgd authunix_create(machname, uid, gid, len, aup_gids)
110 1.9 lukem char *machname;
111 1.9 lukem int uid;
112 1.9 lukem int gid;
113 1.10 lukem int len;
114 1.9 lukem int *aup_gids;
115 1.1 cgd {
116 1.1 cgd struct authunix_parms aup;
117 1.1 cgd char mymem[MAX_AUTH_BYTES];
118 1.1 cgd struct timeval now;
119 1.1 cgd XDR xdrs;
120 1.10 lukem AUTH *auth;
121 1.10 lukem struct audata *au;
122 1.1 cgd
123 1.1 cgd /*
124 1.1 cgd * Allocate and set up auth handle
125 1.1 cgd */
126 1.1 cgd auth = (AUTH *)mem_alloc(sizeof(*auth));
127 1.1 cgd #ifndef KERNEL
128 1.1 cgd if (auth == NULL) {
129 1.10 lukem warnx("authunix_create: out of memory");
130 1.1 cgd return (NULL);
131 1.1 cgd }
132 1.1 cgd #endif
133 1.1 cgd au = (struct audata *)mem_alloc(sizeof(*au));
134 1.1 cgd #ifndef KERNEL
135 1.1 cgd if (au == NULL) {
136 1.10 lukem warnx("authunix_create: out of memory");
137 1.1 cgd return (NULL);
138 1.1 cgd }
139 1.1 cgd #endif
140 1.1 cgd auth->ah_ops = &auth_unix_ops;
141 1.1 cgd auth->ah_private = (caddr_t)au;
142 1.1 cgd auth->ah_verf = au->au_shcred = _null_auth;
143 1.1 cgd au->au_shfaults = 0;
144 1.1 cgd
145 1.1 cgd /*
146 1.1 cgd * fill in param struct from the given params
147 1.1 cgd */
148 1.1 cgd (void)gettimeofday(&now, (struct timezone *)0);
149 1.1 cgd aup.aup_time = now.tv_sec;
150 1.9 lukem aup.aup_machname = machname;
151 1.1 cgd aup.aup_uid = uid;
152 1.1 cgd aup.aup_gid = gid;
153 1.9 lukem aup.aup_len = (u_int)len;
154 1.9 lukem aup.aup_gids = aup_gids;
155 1.1 cgd
156 1.1 cgd /*
157 1.1 cgd * Serialize the parameters into origcred
158 1.1 cgd */
159 1.1 cgd xdrmem_create(&xdrs, mymem, MAX_AUTH_BYTES, XDR_ENCODE);
160 1.1 cgd if (! xdr_authunix_parms(&xdrs, &aup))
161 1.1 cgd abort();
162 1.9 lukem au->au_origcred.oa_length = len = XDR_GETPOS(&xdrs);
163 1.1 cgd au->au_origcred.oa_flavor = AUTH_UNIX;
164 1.1 cgd #ifdef KERNEL
165 1.9 lukem au->au_origcred.oa_base = mem_alloc((u_int) len);
166 1.1 cgd #else
167 1.9 lukem if ((au->au_origcred.oa_base = mem_alloc((u_int) len)) == NULL) {
168 1.10 lukem warnx("authunix_create: out of memory");
169 1.1 cgd return (NULL);
170 1.1 cgd }
171 1.1 cgd #endif
172 1.10 lukem memmove(au->au_origcred.oa_base, mymem, (size_t)len);
173 1.1 cgd
174 1.1 cgd /*
175 1.1 cgd * set auth handle to reflect new cred.
176 1.1 cgd */
177 1.1 cgd auth->ah_cred = au->au_origcred;
178 1.1 cgd marshal_new_auth(auth);
179 1.1 cgd return (auth);
180 1.1 cgd }
181 1.1 cgd
182 1.1 cgd /*
183 1.1 cgd * Returns an auth handle with parameters determined by doing lots of
184 1.1 cgd * syscalls.
185 1.1 cgd */
186 1.1 cgd AUTH *
187 1.1 cgd authunix_create_default()
188 1.1 cgd {
189 1.10 lukem int len;
190 1.1 cgd char machname[MAX_MACHINE_NAME + 1];
191 1.10 lukem int uid;
192 1.10 lukem int gid;
193 1.9 lukem int gids[NGRPS];
194 1.1 cgd
195 1.1 cgd if (gethostname(machname, MAX_MACHINE_NAME) == -1)
196 1.1 cgd abort();
197 1.1 cgd machname[MAX_MACHINE_NAME] = 0;
198 1.1 cgd uid = geteuid();
199 1.1 cgd gid = getegid();
200 1.1 cgd if ((len = getgroups(NGRPS, gids)) < 0)
201 1.1 cgd abort();
202 1.1 cgd return (authunix_create(machname, uid, gid, len, gids));
203 1.1 cgd }
204 1.1 cgd
205 1.1 cgd /*
206 1.1 cgd * authunix operations
207 1.1 cgd */
208 1.1 cgd
209 1.1 cgd static void
210 1.1 cgd authunix_nextverf(auth)
211 1.1 cgd AUTH *auth;
212 1.1 cgd {
213 1.1 cgd /* no action necessary */
214 1.1 cgd }
215 1.1 cgd
216 1.1 cgd static bool_t
217 1.1 cgd authunix_marshal(auth, xdrs)
218 1.1 cgd AUTH *auth;
219 1.1 cgd XDR *xdrs;
220 1.1 cgd {
221 1.10 lukem struct audata *au = AUTH_PRIVATE(auth);
222 1.1 cgd
223 1.1 cgd return (XDR_PUTBYTES(xdrs, au->au_marshed, au->au_mpos));
224 1.1 cgd }
225 1.1 cgd
226 1.1 cgd static bool_t
227 1.1 cgd authunix_validate(auth, verf)
228 1.10 lukem AUTH *auth;
229 1.5 christos struct opaque_auth *verf;
230 1.1 cgd {
231 1.10 lukem struct audata *au;
232 1.1 cgd XDR xdrs;
233 1.1 cgd
234 1.5 christos if (verf->oa_flavor == AUTH_SHORT) {
235 1.1 cgd au = AUTH_PRIVATE(auth);
236 1.9 lukem xdrmem_create(&xdrs, verf->oa_base, verf->oa_length, XDR_DECODE);
237 1.1 cgd
238 1.1 cgd if (au->au_shcred.oa_base != NULL) {
239 1.1 cgd mem_free(au->au_shcred.oa_base,
240 1.1 cgd au->au_shcred.oa_length);
241 1.1 cgd au->au_shcred.oa_base = NULL;
242 1.1 cgd }
243 1.1 cgd if (xdr_opaque_auth(&xdrs, &au->au_shcred)) {
244 1.1 cgd auth->ah_cred = au->au_shcred;
245 1.1 cgd } else {
246 1.1 cgd xdrs.x_op = XDR_FREE;
247 1.1 cgd (void)xdr_opaque_auth(&xdrs, &au->au_shcred);
248 1.1 cgd au->au_shcred.oa_base = NULL;
249 1.1 cgd auth->ah_cred = au->au_origcred;
250 1.1 cgd }
251 1.1 cgd marshal_new_auth(auth);
252 1.1 cgd }
253 1.1 cgd return (TRUE);
254 1.1 cgd }
255 1.1 cgd
256 1.1 cgd static bool_t
257 1.1 cgd authunix_refresh(auth)
258 1.10 lukem AUTH *auth;
259 1.1 cgd {
260 1.10 lukem struct audata *au = AUTH_PRIVATE(auth);
261 1.1 cgd struct authunix_parms aup;
262 1.1 cgd struct timeval now;
263 1.1 cgd XDR xdrs;
264 1.10 lukem int stat;
265 1.1 cgd
266 1.1 cgd if (auth->ah_cred.oa_base == au->au_origcred.oa_base) {
267 1.1 cgd /* there is no hope. Punt */
268 1.1 cgd return (FALSE);
269 1.1 cgd }
270 1.1 cgd au->au_shfaults ++;
271 1.1 cgd
272 1.1 cgd /* first deserialize the creds back into a struct authunix_parms */
273 1.1 cgd aup.aup_machname = NULL;
274 1.9 lukem aup.aup_gids = (int *)NULL;
275 1.1 cgd xdrmem_create(&xdrs, au->au_origcred.oa_base,
276 1.1 cgd au->au_origcred.oa_length, XDR_DECODE);
277 1.1 cgd stat = xdr_authunix_parms(&xdrs, &aup);
278 1.1 cgd if (! stat)
279 1.1 cgd goto done;
280 1.1 cgd
281 1.1 cgd /* update the time and serialize in place */
282 1.1 cgd (void)gettimeofday(&now, (struct timezone *)0);
283 1.1 cgd aup.aup_time = now.tv_sec;
284 1.1 cgd xdrs.x_op = XDR_ENCODE;
285 1.1 cgd XDR_SETPOS(&xdrs, 0);
286 1.1 cgd stat = xdr_authunix_parms(&xdrs, &aup);
287 1.1 cgd if (! stat)
288 1.1 cgd goto done;
289 1.1 cgd auth->ah_cred = au->au_origcred;
290 1.1 cgd marshal_new_auth(auth);
291 1.1 cgd done:
292 1.1 cgd /* free the struct authunix_parms created by deserializing */
293 1.1 cgd xdrs.x_op = XDR_FREE;
294 1.1 cgd (void)xdr_authunix_parms(&xdrs, &aup);
295 1.1 cgd XDR_DESTROY(&xdrs);
296 1.1 cgd return (stat);
297 1.1 cgd }
298 1.1 cgd
299 1.1 cgd static void
300 1.1 cgd authunix_destroy(auth)
301 1.10 lukem AUTH *auth;
302 1.1 cgd {
303 1.10 lukem struct audata *au = AUTH_PRIVATE(auth);
304 1.1 cgd
305 1.1 cgd mem_free(au->au_origcred.oa_base, au->au_origcred.oa_length);
306 1.1 cgd
307 1.1 cgd if (au->au_shcred.oa_base != NULL)
308 1.1 cgd mem_free(au->au_shcred.oa_base, au->au_shcred.oa_length);
309 1.1 cgd
310 1.1 cgd mem_free(auth->ah_private, sizeof(struct audata));
311 1.1 cgd
312 1.1 cgd if (auth->ah_verf.oa_base != NULL)
313 1.1 cgd mem_free(auth->ah_verf.oa_base, auth->ah_verf.oa_length);
314 1.1 cgd
315 1.9 lukem mem_free((caddr_t)auth, sizeof(*auth));
316 1.1 cgd }
317 1.1 cgd
318 1.1 cgd /*
319 1.1 cgd * Marshals (pre-serializes) an auth struct.
320 1.1 cgd * sets private data, au_marshed and au_mpos
321 1.1 cgd */
322 1.3 jtc static void
323 1.1 cgd marshal_new_auth(auth)
324 1.10 lukem AUTH *auth;
325 1.1 cgd {
326 1.10 lukem XDR xdr_stream;
327 1.10 lukem XDR *xdrs = &xdr_stream;
328 1.10 lukem struct audata *au = AUTH_PRIVATE(auth);
329 1.1 cgd
330 1.1 cgd xdrmem_create(xdrs, au->au_marshed, MAX_AUTH_BYTES, XDR_ENCODE);
331 1.1 cgd if ((! xdr_opaque_auth(xdrs, &(auth->ah_cred))) ||
332 1.10 lukem (! xdr_opaque_auth(xdrs, &(auth->ah_verf))))
333 1.10 lukem warnx("auth_none.c - Fatal marshalling problem");
334 1.10 lukem else
335 1.1 cgd au->au_mpos = XDR_GETPOS(xdrs);
336 1.1 cgd XDR_DESTROY(xdrs);
337 1.1 cgd }
338