Home | History | Annotate | Line # | Download | only in passwd
      1  1.20  christos /* $NetBSD: krb5_passwd.c,v 1.20 2012/04/22 23:43:51 christos Exp $ */
      2   1.2   thorpej 
      3   1.8   thorpej /*
      4  1.13   thorpej  * Copyright (c) 2000, 2005 The NetBSD Foundation, Inc.
      5   1.1    brezak  * All rights reserved.
      6   1.1    brezak  *
      7  1.13   thorpej  * This code is derived from software contributed to The NetBSD Foundation
      8  1.13   thorpej  * by Johan Danielsson; and by Jason R. Thorpe.
      9   1.8   thorpej  *
     10   1.8   thorpej  * Redistribution and use in source and binary forms, with or without
     11   1.8   thorpej  * modification, are permitted provided that the following conditions
     12   1.8   thorpej  * are met:
     13   1.8   thorpej  *
     14   1.8   thorpej  * 1. Redistributions of source code must retain the above copyright
     15   1.8   thorpej  *    notice, this list of conditions and the following disclaimer.
     16   1.8   thorpej  * 2. Redistributions in binary form must reproduce the above copyright
     17   1.8   thorpej  *    notice, this list of conditions and the following disclaimer in the
     18   1.8   thorpej  *    documentation and/or other materials provided with the distribution.
     19   1.8   thorpej  *
     20   1.8   thorpej  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     21   1.8   thorpej  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     22   1.8   thorpej  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     23   1.8   thorpej  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     24   1.8   thorpej  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     25   1.8   thorpej  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     26   1.8   thorpej  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     27   1.8   thorpej  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     28   1.8   thorpej  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     29   1.8   thorpej  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30   1.8   thorpej  * POSSIBILITY OF SUCH DAMAGE.
     31   1.1    brezak  */
     32   1.1    brezak 
     33   1.8   thorpej /* uses the `Kerberos Change Password Protocol' */
     34   1.8   thorpej 
     35   1.1    brezak #include <stdio.h>
     36   1.5     lukem #include <stdlib.h>
     37   1.1    brezak #include <string.h>
     38   1.8   thorpej #include <err.h>
     39  1.13   thorpej #include <errno.h>
     40   1.9        ad #include <pwd.h>
     41  1.13   thorpej #include <unistd.h>
     42   1.1    brezak 
     43  1.11    itojun #include <openssl/ui.h>
     44   1.8   thorpej #include <krb5.h>
     45   1.1    brezak 
     46   1.8   thorpej #include "extern.h"
     47   1.1    brezak 
     48  1.20  christos static void
     49  1.20  christos pwkrb5_warn(const char *msg, krb5_context context, krb5_error_code ret)
     50  1.20  christos {
     51  1.20  christos     const char *errtxt = krb5_get_error_message(context, ret);
     52  1.20  christos     if (errtxt != NULL) {
     53  1.20  christos 	    warnx("%s: %s", msg, errtxt);
     54  1.20  christos 	    krb5_free_error_message(context, errtxt);
     55  1.20  christos     } else
     56  1.20  christos 	    warnx("%s: %d", msg, ret);
     57  1.20  christos }
     58  1.20  christos 
     59  1.13   thorpej #ifdef USE_PAM
     60  1.13   thorpej 
     61  1.13   thorpej void
     62  1.13   thorpej pwkrb5_usage(const char *prefix)
     63  1.13   thorpej {
     64  1.13   thorpej 
     65  1.13   thorpej 	(void) fprintf(stderr, "%s %s [-d krb5 | -k] [principal]\n",
     66  1.13   thorpej 	    prefix, getprogname());
     67  1.13   thorpej }
     68  1.13   thorpej 
     69  1.13   thorpej void
     70  1.13   thorpej pwkrb5_argv0_usage(const char *prefix)
     71  1.13   thorpej {
     72  1.13   thorpej 
     73  1.13   thorpej 	(void) fprintf(stderr, "%s %s [principal]\n",
     74  1.13   thorpej 	    prefix, getprogname());
     75  1.13   thorpej }
     76  1.13   thorpej 
     77  1.13   thorpej void
     78  1.13   thorpej pwkrb5_process(const char *username, int argc, char **argv)
     79  1.13   thorpej {
     80  1.13   thorpej 	krb5_context context;
     81  1.13   thorpej 	krb5_error_code ret;
     82  1.19     elric 	krb5_get_init_creds_opt *opt;
     83  1.13   thorpej 	krb5_principal principal;
     84  1.13   thorpej 	krb5_creds cred;
     85  1.13   thorpej 	int result_code;
     86  1.13   thorpej 	krb5_data result_code_string, result_string;
     87  1.13   thorpej 	char pwbuf[BUFSIZ];
     88  1.13   thorpej 	int ch;
     89  1.13   thorpej 
     90  1.13   thorpej 	while ((ch = getopt(argc, argv, "5ku:")) != -1) {
     91  1.13   thorpej 		switch (ch) {
     92  1.13   thorpej 		case '5':
     93  1.13   thorpej 			/*
     94  1.13   thorpej 			 * Compatibility option that historically
     95  1.13   thorpej 			 * specified to use Kerberos 5.  Silently
     96  1.13   thorpej 			 * ignore it.
     97  1.13   thorpej 			 */
     98  1.13   thorpej 			break;
     99  1.13   thorpej 
    100  1.13   thorpej 		case 'k':
    101  1.13   thorpej 			/*
    102  1.13   thorpej 			 * Absorb the -k that may have gotten us here.
    103  1.13   thorpej 			 */
    104  1.13   thorpej 			break;
    105  1.13   thorpej 
    106  1.13   thorpej 		case 'u':
    107  1.13   thorpej 			/*
    108  1.13   thorpej 			 * Historical option to specify principal.
    109  1.13   thorpej 			 */
    110  1.13   thorpej 			username = optarg;
    111  1.13   thorpej 			break;
    112  1.13   thorpej 
    113  1.13   thorpej 		default:
    114  1.13   thorpej 			usage();
    115  1.13   thorpej 			/* NOTREACHED */
    116  1.13   thorpej 		}
    117  1.13   thorpej 	}
    118  1.13   thorpej 
    119  1.13   thorpej 	argc -= optind;
    120  1.13   thorpej 	argv += optind;
    121  1.13   thorpej 
    122  1.13   thorpej 	switch (argc) {
    123  1.13   thorpej 	case 0:
    124  1.13   thorpej 		/* username already provided */
    125  1.13   thorpej 		break;
    126  1.13   thorpej 	case 1:
    127  1.13   thorpej 		/* overrides -u <principal> */
    128  1.13   thorpej 		username = argv[0];
    129  1.13   thorpej 		break;
    130  1.13   thorpej 	default:
    131  1.13   thorpej 		usage();
    132  1.13   thorpej 		/* NOTREACHED */
    133  1.13   thorpej 	}
    134  1.13   thorpej 
    135  1.13   thorpej 	ret = krb5_init_context(&context);
    136  1.13   thorpej 	if (ret != 0) {
    137  1.13   thorpej 		if (ret == ENXIO)
    138  1.13   thorpej 			errx(1, "Kerberos 5 not in use.");
    139  1.19     elric 		errx(1, "Unable to initialize Kerberos 5: %s", strerror(ret));
    140  1.19     elric 	}
    141  1.19     elric 
    142  1.19     elric 	ret = krb5_get_init_creds_opt_alloc(context, &opt);
    143  1.19     elric 	if (ret) {
    144  1.20  christos 		pwkrb5_warn("failed to allocate opts", context, ret);
    145  1.13   thorpej 		goto bad;
    146  1.13   thorpej 	}
    147  1.13   thorpej 
    148  1.19     elric 	krb5_get_init_creds_opt_set_tkt_life(opt, 300L);
    149  1.19     elric 	krb5_get_init_creds_opt_set_forwardable(opt, FALSE);
    150  1.19     elric 	krb5_get_init_creds_opt_set_proxiable(opt, FALSE);
    151  1.13   thorpej 
    152  1.13   thorpej 	ret = krb5_parse_name(context, username, &principal);
    153  1.13   thorpej 	if (ret) {
    154  1.20  christos 		krb5_get_init_creds_opt_free(context, opt);
    155  1.20  christos 		pwkrb5_warn("failed to parse principal", context, ret);
    156  1.13   thorpej 		goto bad;
    157  1.13   thorpej 	}
    158  1.13   thorpej 
    159  1.13   thorpej 	ret = krb5_get_init_creds_password(context,
    160  1.13   thorpej 					   &cred,
    161  1.13   thorpej 					   principal,
    162  1.13   thorpej 					   NULL,
    163  1.13   thorpej 					   krb5_prompter_posix,
    164  1.13   thorpej 					   NULL,
    165  1.14  christos 					   0L,
    166  1.13   thorpej 					   "kadmin/changepw",
    167  1.19     elric 					   opt);
    168  1.13   thorpej 
    169  1.20  christos 	krb5_get_init_creds_opt_free(context, opt);
    170  1.13   thorpej 	switch (ret) {
    171  1.13   thorpej 	case 0:
    172  1.13   thorpej 		break;
    173  1.13   thorpej 
    174  1.13   thorpej 	case KRB5_LIBOS_PWDINTR :
    175  1.13   thorpej 		/* XXX */
    176  1.13   thorpej 		goto bad;
    177  1.13   thorpej 
    178  1.13   thorpej 	case KRB5KRB_AP_ERR_BAD_INTEGRITY :
    179  1.13   thorpej 	case KRB5KRB_AP_ERR_MODIFIED :
    180  1.13   thorpej 		fprintf(stderr, "Password incorrect\n");
    181  1.13   thorpej 		goto bad;
    182  1.13   thorpej 
    183  1.13   thorpej 	default:
    184  1.20  christos 		pwkrb5_warn("failed to get credentials", context, ret);
    185  1.13   thorpej 		goto bad;
    186  1.13   thorpej  	}
    187  1.13   thorpej 
    188  1.13   thorpej 	krb5_data_zero(&result_code_string);
    189  1.13   thorpej 	krb5_data_zero(&result_string);
    190  1.13   thorpej 
    191  1.13   thorpej 	/* XXX use getpass? It has a broken interface. */
    192  1.13   thorpej 	if (UI_UTIL_read_pw_string(pwbuf, sizeof(pwbuf),
    193  1.13   thorpej 				   "New password: ", 1) != 0)
    194  1.13   thorpej 		goto bad;
    195  1.13   thorpej 
    196  1.13   thorpej 	ret = krb5_set_password(context, &cred, pwbuf, NULL,
    197  1.13   thorpej 				&result_code,
    198  1.13   thorpej 				&result_code_string,
    199  1.13   thorpej 				&result_string);
    200  1.13   thorpej 	if (ret) {
    201  1.20  christos 		pwkrb5_warn("unable to set password", context, ret);
    202  1.13   thorpej 		goto bad;
    203  1.13   thorpej 	}
    204  1.13   thorpej 
    205  1.13   thorpej 	printf("%s%s%.*s\n",
    206  1.13   thorpej 	    krb5_passwd_result_to_string(context, result_code),
    207  1.13   thorpej 	    result_string.length > 0 ? " : " : "",
    208  1.13   thorpej 	    (int)result_string.length,
    209  1.13   thorpej 	    result_string.length > 0 ? (char *)result_string.data : "");
    210  1.13   thorpej 
    211  1.13   thorpej 	krb5_data_free(&result_code_string);
    212  1.13   thorpej 	krb5_data_free(&result_string);
    213  1.13   thorpej 
    214  1.15   mlelstv 	krb5_free_cred_contents(context, &cred);
    215  1.13   thorpej 	krb5_free_context(context);
    216  1.13   thorpej 	if (result_code)
    217  1.13   thorpej 		exit(1);
    218  1.13   thorpej 	return;
    219  1.13   thorpej 
    220  1.13   thorpej  bad:
    221  1.13   thorpej 	krb5_free_context(context);
    222  1.13   thorpej 	exit(1);
    223  1.13   thorpej }
    224  1.13   thorpej 
    225  1.13   thorpej #else /* ! USE_PAM */
    226  1.13   thorpej 
    227  1.18   mlelstv static krb5_context defcontext;
    228   1.8   thorpej static krb5_principal defprinc;
    229  1.13   thorpej static int kusage = PW_USE;
    230   1.1    brezak 
    231   1.3       tls int
    232   1.8   thorpej krb5_init(const char *progname)
    233   1.1    brezak {
    234  1.18   mlelstv     return krb5_init_context(&defcontext);
    235   1.8   thorpej }
    236   1.1    brezak 
    237   1.8   thorpej int
    238  1.18   mlelstv krb5_arg (char ch, const char *opt)
    239   1.1    brezak {
    240   1.8   thorpej     krb5_error_code ret;
    241   1.8   thorpej     switch(ch) {
    242   1.8   thorpej     case '5':
    243   1.8   thorpej     case 'k':
    244  1.13   thorpej 	kusage = PW_USE_FORCE;
    245   1.8   thorpej 	return 1;
    246   1.8   thorpej     case 'u':
    247  1.18   mlelstv 	ret = krb5_parse_name(defcontext, opt, &defprinc);
    248   1.8   thorpej 	if(ret) {
    249  1.18   mlelstv 	    krb5_warn(defcontext, ret, "%s", opt);
    250   1.8   thorpej 	    return 0;
    251   1.1    brezak 	}
    252   1.8   thorpej 	return 1;
    253   1.1    brezak     }
    254   1.8   thorpej     return 0;
    255   1.1    brezak }
    256   1.1    brezak 
    257   1.8   thorpej int
    258   1.8   thorpej krb5_arg_end(void)
    259   1.1    brezak {
    260  1.13   thorpej     return kusage;
    261   1.1    brezak }
    262   1.1    brezak 
    263   1.8   thorpej void
    264   1.8   thorpej krb5_end(void)
    265   1.1    brezak {
    266  1.18   mlelstv     if (defcontext == NULL)
    267  1.10      fvdl 	return;
    268   1.8   thorpej     if(defprinc)
    269  1.18   mlelstv 	krb5_free_principal(defcontext, defprinc);
    270  1.18   mlelstv     krb5_free_context(defcontext);
    271   1.1    brezak }
    272   1.1    brezak 
    273   1.8   thorpej int
    274   1.8   thorpej krb5_chpw(const char *username)
    275   1.1    brezak {
    276   1.8   thorpej     krb5_error_code ret;
    277   1.8   thorpej     krb5_context context;
    278   1.8   thorpej     krb5_principal principal;
    279  1.20  christos     krb5_get_init_creds_opt *opt;
    280   1.8   thorpej     krb5_creds cred;
    281   1.8   thorpej     int result_code;
    282   1.8   thorpej     krb5_data result_code_string, result_string;
    283   1.8   thorpej     char pwbuf[BUFSIZ];
    284   1.8   thorpej 
    285   1.8   thorpej     ret = krb5_init_context (&context);
    286   1.8   thorpej     if (ret) {
    287  1.20  christos 	pwkrb5_warn("failed kerberos initialisation", context, ret);
    288   1.8   thorpej 	return 1;
    289   1.8   thorpej     }
    290   1.8   thorpej 
    291  1.20  christos     ret = krb5_get_init_creds_opt_alloc (context, &opt);
    292  1.20  christos     if (ret) {
    293  1.20  christos 	pwkrb5_warn("failed to allocate credential opt", context, ret);
    294  1.20  christos 	return 1;
    295  1.20  christos     }
    296   1.8   thorpej 
    297  1.20  christos     krb5_get_init_creds_opt_set_tkt_life (opt, 300);
    298  1.20  christos     krb5_get_init_creds_opt_set_forwardable (opt, FALSE);
    299  1.20  christos     krb5_get_init_creds_opt_set_proxiable (opt, FALSE);
    300   1.8   thorpej 
    301   1.8   thorpej     if(username != NULL) {
    302   1.8   thorpej         ret = krb5_parse_name (context, username, &principal);
    303   1.8   thorpej         if (ret) {
    304  1.20  christos 	    krb5_get_init_creds_opt_free (context, opt);
    305  1.20  christos 	    pwkrb5_warn("failed to parse principal", context, ret);
    306   1.8   thorpej 	    return 1;
    307   1.1    brezak 	}
    308   1.8   thorpej     } else
    309   1.8   thorpej         principal = defprinc;
    310   1.1    brezak 
    311   1.8   thorpej     ret = krb5_get_init_creds_password (context,
    312   1.8   thorpej                                         &cred,
    313   1.8   thorpej                                         principal,
    314   1.8   thorpej                                         NULL,
    315   1.8   thorpej                                         krb5_prompter_posix,
    316   1.8   thorpej                                         NULL,
    317   1.8   thorpej                                         0,
    318   1.8   thorpej                                         "kadmin/changepw",
    319  1.20  christos                                         opt);
    320   1.8   thorpej 
    321  1.20  christos     krb5_get_init_creds_opt_free (context, opt);
    322   1.8   thorpej     switch (ret) {
    323   1.8   thorpej     case 0:
    324   1.8   thorpej         break;
    325   1.8   thorpej     case KRB5_LIBOS_PWDINTR :
    326   1.8   thorpej 	/* XXX */
    327   1.8   thorpej         return 1;
    328   1.8   thorpej     case KRB5KRB_AP_ERR_BAD_INTEGRITY :
    329   1.8   thorpej     case KRB5KRB_AP_ERR_MODIFIED :
    330   1.8   thorpej 	fprintf(stderr, "Password incorrect\n");
    331   1.8   thorpej 	return 1;
    332   1.8   thorpej         break;
    333   1.8   thorpej     default:
    334  1.20  christos 	pwkrb5_warn("failed to get credentials", context, ret);
    335   1.8   thorpej 	return 1;
    336   1.8   thorpej     }
    337   1.8   thorpej     krb5_data_zero (&result_code_string);
    338   1.8   thorpej     krb5_data_zero (&result_string);
    339   1.8   thorpej 
    340   1.8   thorpej     /* XXX use getpass? It has a broken interface. */
    341  1.11    itojun     if(UI_UTIL_read_pw_string(pwbuf, sizeof(pwbuf), "New password: ", 1) != 0)
    342   1.8   thorpej         return 1;
    343   1.8   thorpej 
    344  1.12       lha     ret = krb5_set_password (context, &cred, pwbuf, NULL,
    345  1.12       lha 			     &result_code,
    346  1.12       lha 			     &result_code_string,
    347  1.12       lha 			     &result_string);
    348   1.8   thorpej     if (ret)
    349  1.12       lha         krb5_err (context, 1, ret, "krb5_set_password");
    350   1.8   thorpej 
    351  1.12       lha     printf ("%s%s%.*s\n", krb5_passwd_result_to_string(context, result_code),
    352  1.12       lha 	    result_string.length > 0 ? " : " : "",
    353  1.12       lha 	    (int)result_string.length,
    354  1.12       lha 	    result_string.length > 0 ? (char *)result_string.data : "");
    355   1.8   thorpej 
    356   1.8   thorpej     krb5_data_free (&result_code_string);
    357   1.8   thorpej     krb5_data_free (&result_string);
    358   1.8   thorpej 
    359  1.16     veego     krb5_free_cred_contents (context, &cred);
    360   1.8   thorpej     krb5_free_context (context);
    361   1.8   thorpej     return result_code;
    362   1.1    brezak }
    363  1.13   thorpej 
    364  1.13   thorpej #endif /* USE_PAM */
    365