auth_unix.c revision 1.15 1 1.15 lukem /* $NetBSD: auth_unix.c,v 1.15 1999/09/16 11:45:22 lukem Exp $ */
2 1.2 cgd
3 1.1 cgd /*
4 1.1 cgd * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5 1.1 cgd * unrestricted use provided that this legend is included on all tape
6 1.1 cgd * media and as a part of the software program in whole or part. Users
7 1.1 cgd * may copy or modify Sun RPC without charge, but are not authorized
8 1.1 cgd * to license or distribute it to anyone else except as part of a product or
9 1.1 cgd * program developed by the user.
10 1.1 cgd *
11 1.1 cgd * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12 1.1 cgd * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
13 1.1 cgd * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14 1.1 cgd *
15 1.1 cgd * Sun RPC is provided with no support and without any obligation on the
16 1.1 cgd * part of Sun Microsystems, Inc. to assist in its use, correction,
17 1.1 cgd * modification or enhancement.
18 1.1 cgd *
19 1.1 cgd * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20 1.1 cgd * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21 1.1 cgd * OR ANY PART THEREOF.
22 1.1 cgd *
23 1.1 cgd * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24 1.1 cgd * or profits or other special, indirect and consequential damages, even if
25 1.1 cgd * Sun has been advised of the possibility of such damages.
26 1.1 cgd *
27 1.1 cgd * Sun Microsystems, Inc.
28 1.1 cgd * 2550 Garcia Avenue
29 1.1 cgd * Mountain View, California 94043
30 1.1 cgd */
31 1.1 cgd
32 1.5 christos #include <sys/cdefs.h>
33 1.1 cgd #if defined(LIBC_SCCS) && !defined(lint)
34 1.5 christos #if 0
35 1.5 christos static char *sccsid = "@(#)auth_unix.c 1.19 87/08/11 Copyr 1984 Sun Micro";
36 1.5 christos static char *sccsid = "@(#)auth_unix.c 2.2 88/08/01 4.0 RPCSRC";
37 1.5 christos #else
38 1.15 lukem __RCSID("$NetBSD: auth_unix.c,v 1.15 1999/09/16 11:45:22 lukem Exp $");
39 1.5 christos #endif
40 1.1 cgd #endif
41 1.1 cgd
42 1.1 cgd /*
43 1.1 cgd * auth_unix.c, Implements UNIX style authentication parameters.
44 1.1 cgd *
45 1.1 cgd * Copyright (C) 1984, Sun Microsystems, Inc.
46 1.1 cgd *
47 1.1 cgd * The system is very weak. The client uses no encryption for it's
48 1.1 cgd * credentials and only sends null verifiers. The server sends backs
49 1.9 lukem * null verifiers or optionally a verifier that suggests a new short hand
50 1.1 cgd * for the credentials.
51 1.1 cgd *
52 1.1 cgd */
53 1.1 cgd
54 1.6 jtc #include "namespace.h"
55 1.10 lukem
56 1.11 mrg #include <sys/param.h>
57 1.11 mrg
58 1.15 lukem #include <assert.h>
59 1.10 lukem #include <err.h>
60 1.1 cgd #include <stdio.h>
61 1.1 cgd #include <stdlib.h>
62 1.4 cgd #include <string.h>
63 1.4 cgd #include <unistd.h>
64 1.1 cgd
65 1.1 cgd #include <rpc/types.h>
66 1.1 cgd #include <rpc/xdr.h>
67 1.1 cgd #include <rpc/auth.h>
68 1.1 cgd #include <rpc/auth_unix.h>
69 1.6 jtc
70 1.6 jtc #ifdef __weak_alias
71 1.6 jtc __weak_alias(authunix_create,_authunix_create);
72 1.6 jtc __weak_alias(authunix_create_default,_authunix_create_default);
73 1.6 jtc #endif
74 1.1 cgd
75 1.5 christos
76 1.5 christos /* auth_unix.c */
77 1.5 christos static void authunix_nextverf __P((AUTH *));
78 1.5 christos static bool_t authunix_marshal __P((AUTH *, XDR *));
79 1.5 christos static bool_t authunix_validate __P((AUTH *, struct opaque_auth *));
80 1.5 christos static bool_t authunix_refresh __P((AUTH *));
81 1.5 christos static void authunix_destroy __P((AUTH *));
82 1.5 christos static void marshal_new_auth __P((AUTH *));
83 1.5 christos
84 1.1 cgd /*
85 1.1 cgd * Unix authenticator operations vector
86 1.1 cgd */
87 1.12 mycroft static const struct auth_ops auth_unix_ops = {
88 1.1 cgd authunix_nextverf,
89 1.1 cgd authunix_marshal,
90 1.1 cgd authunix_validate,
91 1.1 cgd authunix_refresh,
92 1.1 cgd authunix_destroy
93 1.1 cgd };
94 1.1 cgd
95 1.1 cgd /*
96 1.1 cgd * This struct is pointed to by the ah_private field of an auth_handle.
97 1.1 cgd */
98 1.1 cgd struct audata {
99 1.1 cgd struct opaque_auth au_origcred; /* original credentials */
100 1.9 lukem struct opaque_auth au_shcred; /* short hand cred */
101 1.9 lukem u_long au_shfaults; /* short hand cache faults */
102 1.1 cgd char au_marshed[MAX_AUTH_BYTES];
103 1.9 lukem u_int au_mpos; /* xdr pos at end of marshed */
104 1.1 cgd };
105 1.1 cgd #define AUTH_PRIVATE(auth) ((struct audata *)auth->ah_private)
106 1.1 cgd
107 1.1 cgd /*
108 1.1 cgd * Create a unix style authenticator.
109 1.1 cgd * Returns an auth handle with the given stuff in it.
110 1.1 cgd */
111 1.1 cgd AUTH *
112 1.1 cgd authunix_create(machname, uid, gid, len, aup_gids)
113 1.9 lukem char *machname;
114 1.9 lukem int uid;
115 1.9 lukem int gid;
116 1.10 lukem int len;
117 1.9 lukem int *aup_gids;
118 1.1 cgd {
119 1.1 cgd struct authunix_parms aup;
120 1.1 cgd char mymem[MAX_AUTH_BYTES];
121 1.1 cgd struct timeval now;
122 1.1 cgd XDR xdrs;
123 1.10 lukem AUTH *auth;
124 1.10 lukem struct audata *au;
125 1.1 cgd
126 1.1 cgd /*
127 1.1 cgd * Allocate and set up auth handle
128 1.1 cgd */
129 1.14 lukem au = NULL;
130 1.1 cgd auth = (AUTH *)mem_alloc(sizeof(*auth));
131 1.1 cgd #ifndef KERNEL
132 1.1 cgd if (auth == NULL) {
133 1.10 lukem warnx("authunix_create: out of memory");
134 1.14 lukem goto cleanup_authunix_create;
135 1.1 cgd }
136 1.1 cgd #endif
137 1.1 cgd au = (struct audata *)mem_alloc(sizeof(*au));
138 1.1 cgd #ifndef KERNEL
139 1.1 cgd if (au == NULL) {
140 1.10 lukem warnx("authunix_create: out of memory");
141 1.14 lukem goto cleanup_authunix_create;
142 1.1 cgd }
143 1.1 cgd #endif
144 1.1 cgd auth->ah_ops = &auth_unix_ops;
145 1.13 christos auth->ah_private = au;
146 1.1 cgd auth->ah_verf = au->au_shcred = _null_auth;
147 1.1 cgd au->au_shfaults = 0;
148 1.14 lukem au->au_origcred.oa_base = NULL;
149 1.1 cgd
150 1.1 cgd /*
151 1.1 cgd * fill in param struct from the given params
152 1.1 cgd */
153 1.1 cgd (void)gettimeofday(&now, (struct timezone *)0);
154 1.1 cgd aup.aup_time = now.tv_sec;
155 1.9 lukem aup.aup_machname = machname;
156 1.1 cgd aup.aup_uid = uid;
157 1.1 cgd aup.aup_gid = gid;
158 1.9 lukem aup.aup_len = (u_int)len;
159 1.9 lukem aup.aup_gids = aup_gids;
160 1.1 cgd
161 1.1 cgd /*
162 1.1 cgd * Serialize the parameters into origcred
163 1.1 cgd */
164 1.1 cgd xdrmem_create(&xdrs, mymem, MAX_AUTH_BYTES, XDR_ENCODE);
165 1.1 cgd if (! xdr_authunix_parms(&xdrs, &aup))
166 1.1 cgd abort();
167 1.9 lukem au->au_origcred.oa_length = len = XDR_GETPOS(&xdrs);
168 1.1 cgd au->au_origcred.oa_flavor = AUTH_UNIX;
169 1.1 cgd #ifdef KERNEL
170 1.9 lukem au->au_origcred.oa_base = mem_alloc((u_int) len);
171 1.1 cgd #else
172 1.9 lukem if ((au->au_origcred.oa_base = mem_alloc((u_int) len)) == NULL) {
173 1.10 lukem warnx("authunix_create: out of memory");
174 1.14 lukem goto cleanup_authunix_create;
175 1.1 cgd }
176 1.1 cgd #endif
177 1.10 lukem memmove(au->au_origcred.oa_base, mymem, (size_t)len);
178 1.1 cgd
179 1.1 cgd /*
180 1.1 cgd * set auth handle to reflect new cred.
181 1.1 cgd */
182 1.1 cgd auth->ah_cred = au->au_origcred;
183 1.1 cgd marshal_new_auth(auth);
184 1.1 cgd return (auth);
185 1.14 lukem #ifndef KERNEL
186 1.14 lukem cleanup_authunix_create:
187 1.14 lukem if (auth)
188 1.14 lukem mem_free(auth, sizeof(*auth));
189 1.14 lukem if (au) {
190 1.14 lukem if (au->au_origcred.oa_base)
191 1.14 lukem mem_free(au->au_origcred.oa_base, (u_int)len);
192 1.14 lukem mem_free(au, sizeof(*au));
193 1.14 lukem }
194 1.14 lukem return (NULL);
195 1.14 lukem #endif
196 1.1 cgd }
197 1.1 cgd
198 1.1 cgd /*
199 1.1 cgd * Returns an auth handle with parameters determined by doing lots of
200 1.1 cgd * syscalls.
201 1.1 cgd */
202 1.1 cgd AUTH *
203 1.1 cgd authunix_create_default()
204 1.1 cgd {
205 1.10 lukem int len;
206 1.11 mrg char machname[MAXHOSTNAMELEN + 1];
207 1.13 christos uid_t uid;
208 1.13 christos gid_t gid;
209 1.13 christos gid_t gids[NGRPS];
210 1.1 cgd
211 1.11 mrg if (gethostname(machname, sizeof machname) == -1)
212 1.1 cgd abort();
213 1.11 mrg machname[sizeof(machname) - 1] = 0;
214 1.1 cgd uid = geteuid();
215 1.1 cgd gid = getegid();
216 1.1 cgd if ((len = getgroups(NGRPS, gids)) < 0)
217 1.1 cgd abort();
218 1.13 christos /* XXX: interface problem; those should all have been unsigned */
219 1.13 christos return (authunix_create(machname, (int)uid, (int)gid, len,
220 1.13 christos (int *)gids));
221 1.1 cgd }
222 1.1 cgd
223 1.1 cgd /*
224 1.1 cgd * authunix operations
225 1.1 cgd */
226 1.1 cgd
227 1.13 christos /* ARGSUSED */
228 1.1 cgd static void
229 1.1 cgd authunix_nextverf(auth)
230 1.1 cgd AUTH *auth;
231 1.1 cgd {
232 1.1 cgd /* no action necessary */
233 1.1 cgd }
234 1.1 cgd
235 1.1 cgd static bool_t
236 1.1 cgd authunix_marshal(auth, xdrs)
237 1.1 cgd AUTH *auth;
238 1.1 cgd XDR *xdrs;
239 1.1 cgd {
240 1.15 lukem struct audata *au;
241 1.15 lukem
242 1.15 lukem _DIAGASSERT(auth != NULL);
243 1.15 lukem _DIAGASSERT(xdrs != NULL);
244 1.1 cgd
245 1.15 lukem au = AUTH_PRIVATE(auth);
246 1.1 cgd return (XDR_PUTBYTES(xdrs, au->au_marshed, au->au_mpos));
247 1.1 cgd }
248 1.1 cgd
249 1.1 cgd static bool_t
250 1.1 cgd authunix_validate(auth, verf)
251 1.10 lukem AUTH *auth;
252 1.5 christos struct opaque_auth *verf;
253 1.1 cgd {
254 1.10 lukem struct audata *au;
255 1.1 cgd XDR xdrs;
256 1.1 cgd
257 1.15 lukem _DIAGASSERT(auth != NULL);
258 1.15 lukem _DIAGASSERT(verf != NULL);
259 1.15 lukem
260 1.5 christos if (verf->oa_flavor == AUTH_SHORT) {
261 1.1 cgd au = AUTH_PRIVATE(auth);
262 1.14 lukem xdrmem_create(&xdrs, verf->oa_base, verf->oa_length,
263 1.14 lukem XDR_DECODE);
264 1.1 cgd
265 1.1 cgd if (au->au_shcred.oa_base != NULL) {
266 1.1 cgd mem_free(au->au_shcred.oa_base,
267 1.1 cgd au->au_shcred.oa_length);
268 1.1 cgd au->au_shcred.oa_base = NULL;
269 1.1 cgd }
270 1.1 cgd if (xdr_opaque_auth(&xdrs, &au->au_shcred)) {
271 1.1 cgd auth->ah_cred = au->au_shcred;
272 1.1 cgd } else {
273 1.1 cgd xdrs.x_op = XDR_FREE;
274 1.1 cgd (void)xdr_opaque_auth(&xdrs, &au->au_shcred);
275 1.1 cgd au->au_shcred.oa_base = NULL;
276 1.1 cgd auth->ah_cred = au->au_origcred;
277 1.1 cgd }
278 1.1 cgd marshal_new_auth(auth);
279 1.1 cgd }
280 1.1 cgd return (TRUE);
281 1.1 cgd }
282 1.1 cgd
283 1.1 cgd static bool_t
284 1.1 cgd authunix_refresh(auth)
285 1.10 lukem AUTH *auth;
286 1.1 cgd {
287 1.10 lukem struct audata *au = AUTH_PRIVATE(auth);
288 1.1 cgd struct authunix_parms aup;
289 1.1 cgd struct timeval now;
290 1.1 cgd XDR xdrs;
291 1.10 lukem int stat;
292 1.1 cgd
293 1.15 lukem _DIAGASSERT(auth != NULL);
294 1.15 lukem
295 1.1 cgd if (auth->ah_cred.oa_base == au->au_origcred.oa_base) {
296 1.1 cgd /* there is no hope. Punt */
297 1.1 cgd return (FALSE);
298 1.1 cgd }
299 1.1 cgd au->au_shfaults ++;
300 1.1 cgd
301 1.1 cgd /* first deserialize the creds back into a struct authunix_parms */
302 1.1 cgd aup.aup_machname = NULL;
303 1.9 lukem aup.aup_gids = (int *)NULL;
304 1.1 cgd xdrmem_create(&xdrs, au->au_origcred.oa_base,
305 1.1 cgd au->au_origcred.oa_length, XDR_DECODE);
306 1.1 cgd stat = xdr_authunix_parms(&xdrs, &aup);
307 1.1 cgd if (! stat)
308 1.1 cgd goto done;
309 1.1 cgd
310 1.1 cgd /* update the time and serialize in place */
311 1.1 cgd (void)gettimeofday(&now, (struct timezone *)0);
312 1.1 cgd aup.aup_time = now.tv_sec;
313 1.1 cgd xdrs.x_op = XDR_ENCODE;
314 1.1 cgd XDR_SETPOS(&xdrs, 0);
315 1.1 cgd stat = xdr_authunix_parms(&xdrs, &aup);
316 1.1 cgd if (! stat)
317 1.1 cgd goto done;
318 1.1 cgd auth->ah_cred = au->au_origcred;
319 1.1 cgd marshal_new_auth(auth);
320 1.1 cgd done:
321 1.1 cgd /* free the struct authunix_parms created by deserializing */
322 1.1 cgd xdrs.x_op = XDR_FREE;
323 1.1 cgd (void)xdr_authunix_parms(&xdrs, &aup);
324 1.1 cgd XDR_DESTROY(&xdrs);
325 1.1 cgd return (stat);
326 1.1 cgd }
327 1.1 cgd
328 1.1 cgd static void
329 1.1 cgd authunix_destroy(auth)
330 1.10 lukem AUTH *auth;
331 1.1 cgd {
332 1.15 lukem struct audata *au;
333 1.15 lukem
334 1.15 lukem _DIAGASSERT(auth != NULL);
335 1.1 cgd
336 1.15 lukem au = AUTH_PRIVATE(auth);
337 1.1 cgd mem_free(au->au_origcred.oa_base, au->au_origcred.oa_length);
338 1.1 cgd
339 1.1 cgd if (au->au_shcred.oa_base != NULL)
340 1.1 cgd mem_free(au->au_shcred.oa_base, au->au_shcred.oa_length);
341 1.1 cgd
342 1.1 cgd mem_free(auth->ah_private, sizeof(struct audata));
343 1.1 cgd
344 1.1 cgd if (auth->ah_verf.oa_base != NULL)
345 1.1 cgd mem_free(auth->ah_verf.oa_base, auth->ah_verf.oa_length);
346 1.1 cgd
347 1.13 christos mem_free(auth, sizeof(*auth));
348 1.1 cgd }
349 1.1 cgd
350 1.1 cgd /*
351 1.1 cgd * Marshals (pre-serializes) an auth struct.
352 1.1 cgd * sets private data, au_marshed and au_mpos
353 1.1 cgd */
354 1.3 jtc static void
355 1.1 cgd marshal_new_auth(auth)
356 1.10 lukem AUTH *auth;
357 1.1 cgd {
358 1.10 lukem XDR xdr_stream;
359 1.10 lukem XDR *xdrs = &xdr_stream;
360 1.15 lukem struct audata *au;
361 1.15 lukem
362 1.15 lukem _DIAGASSERT(auth != NULL);
363 1.1 cgd
364 1.15 lukem au = AUTH_PRIVATE(auth);
365 1.1 cgd xdrmem_create(xdrs, au->au_marshed, MAX_AUTH_BYTES, XDR_ENCODE);
366 1.1 cgd if ((! xdr_opaque_auth(xdrs, &(auth->ah_cred))) ||
367 1.10 lukem (! xdr_opaque_auth(xdrs, &(auth->ah_verf))))
368 1.10 lukem warnx("auth_none.c - Fatal marshalling problem");
369 1.10 lukem else
370 1.1 cgd au->au_mpos = XDR_GETPOS(xdrs);
371 1.1 cgd XDR_DESTROY(xdrs);
372 1.1 cgd }
373