1 1.12 christos /* $NetBSD: pam_group.c,v 1.12 2009/03/08 19:38:03 christos Exp $ */ 2 1.2 christos 3 1.1 christos /*- 4 1.1 christos * Copyright (c) 2003 Networks Associates Technology, Inc. 5 1.1 christos * All rights reserved. 6 1.1 christos * 7 1.1 christos * Portions of this software were developed for the FreeBSD Project by 8 1.1 christos * ThinkSec AS and NAI Labs, the Security Research Division of Network 9 1.1 christos * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 10 1.1 christos * ("CBOSS"), as part of the DARPA CHATS research program. 11 1.1 christos * 12 1.1 christos * Redistribution and use in source and binary forms, with or without 13 1.1 christos * modification, are permitted provided that the following conditions 14 1.1 christos * are met: 15 1.1 christos * 1. Redistributions of source code must retain the above copyright 16 1.1 christos * notice, this list of conditions and the following disclaimer. 17 1.1 christos * 2. Redistributions in binary form must reproduce the above copyright 18 1.1 christos * notice, this list of conditions and the following disclaimer in the 19 1.1 christos * documentation and/or other materials provided with the distribution. 20 1.1 christos * 3. The name of the author may not be used to endorse or promote 21 1.1 christos * products derived from this software without specific prior written 22 1.1 christos * permission. 23 1.1 christos * 24 1.1 christos * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 25 1.1 christos * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 26 1.1 christos * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 27 1.1 christos * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 28 1.1 christos * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 29 1.1 christos * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 30 1.1 christos * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 31 1.1 christos * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 32 1.1 christos * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 33 1.1 christos * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 34 1.1 christos * SUCH DAMAGE. 35 1.1 christos */ 36 1.1 christos 37 1.1 christos #include <sys/cdefs.h> 38 1.2 christos #ifdef __FreeBSD__ 39 1.1 christos __FBSDID("$FreeBSD: src/lib/libpam/modules/pam_group/pam_group.c,v 1.4 2003/12/11 13:55:15 des Exp $"); 40 1.2 christos #else 41 1.12 christos __RCSID("$NetBSD: pam_group.c,v 1.12 2009/03/08 19:38:03 christos Exp $"); 42 1.2 christos #endif 43 1.1 christos 44 1.1 christos #include <sys/types.h> 45 1.1 christos 46 1.1 christos #include <grp.h> 47 1.1 christos #include <pwd.h> 48 1.1 christos #include <stdarg.h> 49 1.1 christos #include <stdio.h> 50 1.1 christos #include <string.h> 51 1.4 christos #include <stdlib.h> 52 1.1 christos #include <unistd.h> 53 1.3 christos #include <login_cap.h> 54 1.1 christos 55 1.1 christos #define PAM_SM_AUTH 56 1.1 christos 57 1.1 christos #include <security/pam_appl.h> 58 1.1 christos #include <security/pam_modules.h> 59 1.3 christos #include <security/pam_mod_misc.h> 60 1.1 christos #include <security/openpam.h> 61 1.1 christos 62 1.3 christos static int authenticate(pam_handle_t *, struct passwd *, int); 63 1.1 christos 64 1.12 christos #define PASSWORD_PROMPT "%s's password:" 65 1.11 christos 66 1.1 christos PAM_EXTERN int 67 1.1 christos pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, 68 1.1 christos int argc __unused, const char *argv[] __unused) 69 1.1 christos { 70 1.1 christos const char *group, *user; 71 1.1 christos const void *ruser; 72 1.1 christos char *const *list; 73 1.6 thorpej struct passwd *pwd, pwres; 74 1.9 christos struct group *grp, grres; 75 1.7 christos int pam_err, auth; 76 1.5 christos char *promptresp = NULL; 77 1.6 thorpej char pwbuf[1024]; 78 1.9 christos char grbuf[1024]; 79 1.1 christos 80 1.1 christos /* get target account */ 81 1.1 christos if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || 82 1.6 thorpej user == NULL || 83 1.8 christos getpwnam_r(user, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 84 1.8 christos pwd == NULL) 85 1.1 christos return (PAM_AUTH_ERR); 86 1.1 christos if (pwd->pw_uid != 0 && openpam_get_option(pamh, "root_only")) 87 1.1 christos return (PAM_IGNORE); 88 1.1 christos 89 1.1 christos /* get applicant */ 90 1.9 christos if (pam_get_item(pamh, PAM_RUSER, &ruser) != PAM_SUCCESS || 91 1.9 christos ruser == NULL || 92 1.9 christos getpwnam_r(ruser, &pwres, pwbuf, sizeof(pwbuf), &pwd) != 0 || 93 1.9 christos pwd == NULL) 94 1.1 christos return (PAM_AUTH_ERR); 95 1.1 christos 96 1.7 christos auth = openpam_get_option(pamh, "authenticate") != NULL; 97 1.7 christos 98 1.1 christos /* get regulating group */ 99 1.1 christos if ((group = openpam_get_option(pamh, "group")) == NULL) 100 1.1 christos group = "wheel"; 101 1.9 christos if (getgrnam_r(group, &grres, grbuf, sizeof(grbuf), &grp) != 0 || 102 1.9 christos grp == NULL || grp->gr_mem == NULL) 103 1.1 christos goto failed; 104 1.1 christos 105 1.1 christos /* check if the group is empty */ 106 1.1 christos if (*grp->gr_mem == NULL) 107 1.1 christos goto failed; 108 1.1 christos 109 1.1 christos /* check membership */ 110 1.1 christos if (pwd->pw_gid == grp->gr_gid) 111 1.1 christos goto found; 112 1.1 christos for (list = grp->gr_mem; *list != NULL; ++list) 113 1.1 christos if (strcmp(*list, pwd->pw_name) == 0) 114 1.1 christos goto found; 115 1.1 christos 116 1.1 christos not_found: 117 1.1 christos if (openpam_get_option(pamh, "deny")) 118 1.1 christos return (PAM_SUCCESS); 119 1.7 christos if (!auth) { 120 1.7 christos pam_err = pam_prompt(pamh, PAM_ERROR_MSG, &promptresp, 121 1.7 christos "%s: You are not listed in the correct secondary group" 122 1.7 christos " (%s) to %s %s.", getprogname(), group, getprogname(), 123 1.7 christos user); 124 1.7 christos if (pam_err == PAM_SUCCESS && promptresp) 125 1.7 christos free(promptresp); 126 1.7 christos } 127 1.1 christos return (PAM_AUTH_ERR); 128 1.1 christos found: 129 1.7 christos if (auth) 130 1.3 christos if ((pam_err = authenticate(pamh, pwd, flags)) != PAM_SUCCESS) 131 1.3 christos return pam_err; 132 1.3 christos 133 1.1 christos if (openpam_get_option(pamh, "deny")) 134 1.1 christos return (PAM_AUTH_ERR); 135 1.1 christos return (PAM_SUCCESS); 136 1.1 christos failed: 137 1.1 christos if (openpam_get_option(pamh, "fail_safe")) 138 1.1 christos goto found; 139 1.1 christos else 140 1.1 christos goto not_found; 141 1.1 christos } 142 1.1 christos 143 1.1 christos PAM_EXTERN int 144 1.1 christos pam_sm_setcred(pam_handle_t * pamh __unused, int flags __unused, 145 1.1 christos int argc __unused, const char *argv[] __unused) 146 1.1 christos { 147 1.1 christos 148 1.1 christos return (PAM_SUCCESS); 149 1.1 christos } 150 1.1 christos 151 1.3 christos static int 152 1.3 christos authenticate(pam_handle_t *pamh, struct passwd *pwd, int flags) 153 1.3 christos { 154 1.3 christos int retval; 155 1.3 christos login_cap_t *lc; 156 1.3 christos const char *pass; 157 1.11 christos char password_prompt[80]; 158 1.3 christos 159 1.11 christos (void) snprintf(password_prompt, sizeof(password_prompt), 160 1.11 christos PASSWORD_PROMPT, pwd->pw_name); 161 1.3 christos lc = login_getpwclass(pwd); 162 1.11 christos retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, password_prompt); 163 1.3 christos login_close(lc); 164 1.3 christos 165 1.3 christos if (retval != PAM_SUCCESS) 166 1.3 christos return retval; 167 1.3 christos PAM_LOG("Got password"); 168 1.3 christos if (strcmp(crypt(pass, pwd->pw_passwd), pwd->pw_passwd) == 0) 169 1.3 christos return PAM_SUCCESS; 170 1.3 christos 171 1.3 christos PAM_VERBOSE_ERROR("UNIX authentication refused"); 172 1.3 christos return PAM_AUTH_ERR; 173 1.3 christos } 174 1.3 christos 175 1.3 christos 176 1.1 christos PAM_MODULE_ENTRY("pam_group"); 177