skeyinit.c revision 1.6 1 /* $NetBSD: skeyinit.c,v 1.6 1995/06/05 19:50:48 pk Exp $ */
2
3 /* S/KEY v1.1b (skeyinit.c)
4 *
5 * Authors:
6 * Neil M. Haller <nmh (at) thumper.bellcore.com>
7 * Philip R. Karn <karn (at) chicago.qualcomm.com>
8 * John S. Walden <jsw (at) thumper.bellcore.com>
9 * Scott Chasin <chasin (at) crimelab.com>
10 *
11 * S/KEY initialization and seed update
12 */
13
14 #include <sys/param.h>
15 #include <sys/time.h>
16 #include <sys/resource.h>
17
18 #include <stdio.h>
19 #include <stdlib.h>
20 #include <string.h>
21 #include <err.h>
22 #include <pwd.h>
23 #include <unistd.h>
24 #include <time.h>
25 #include <ctype.h>
26
27 #include "skey.h"
28
29 #define NAMELEN 2
30
31 int skeylookup __ARGS((struct skey * mp, char *name));
32
33 int
34 main(argc, argv)
35 int argc;
36 char *argv[];
37 {
38 int rval, n, nn, i, defaultsetup, l;
39 time_t now;
40 char hostname[MAXHOSTNAMELEN];
41 char seed[18], tmp[80], key[8], defaultseed[17];
42 char passwd[256], passwd2[256], tbuf[27], buf[60];
43 char lastc, me[80], user[8], *salt, *p, *pw;
44 struct skey skey;
45 struct passwd *pp;
46 struct tm *tm;
47
48 time(&now);
49 tm = localtime(&now);
50 strftime(tbuf, sizeof(tbuf), "%M%j", tm);
51
52 if (gethostname(hostname, sizeof(hostname)) < 0)
53 err(1, "gethostname");
54 strncpy(defaultseed, hostname, sizeof(defaultseed)- 1);
55 defaultseed[4] = '\0';
56 strncat(defaultseed, tbuf, sizeof(defaultseed) - 5);
57
58 if ((pp = getpwuid(getuid())) == NULL)
59 err(1, "no user with uid %d", getuid());
60 strcpy(me, pp->pw_name);
61
62 if ((pp = getpwnam(me)) == NULL)
63 err(1, "Who are you?");
64
65 defaultsetup = 1;
66 if (argc > 1) {
67 if (strcmp("-s", argv[1]) == 0)
68 defaultsetup = 0;
69 else
70 pp = getpwnam(argv[1]);
71
72 if (argc > 2)
73 pp = getpwnam(argv[2]);
74 }
75 if (pp == NULL) {
76 err(1, "User unknown");
77 }
78 if (strcmp(pp->pw_name, me) != 0) {
79 if (getuid() != 0) {
80 /* Only root can change other's passwds */
81 printf("Permission denied.\n");
82 exit(1);
83 }
84 }
85 salt = pp->pw_passwd;
86
87 setpriority(PRIO_PROCESS, 0, -4);
88
89 if (getuid() != 0) {
90 setpriority(PRIO_PROCESS, 0, -4);
91
92 pw = getpass("Password:");
93 p = crypt(pw, salt);
94
95 setpriority(PRIO_PROCESS, 0, 0);
96
97 if (pp && strcmp(p, pp->pw_passwd)) {
98 printf("Password incorrect.\n");
99 exit(1);
100 }
101 }
102 rval = skeylookup(&skey, pp->pw_name);
103 switch (rval) {
104 case -1:
105 err(1, "cannot open database");
106 case 0:
107 printf("[Updating %s]\n", pp->pw_name);
108 printf("Old key: %s\n", skey.seed);
109
110 /*
111 * lets be nice if they have a skey.seed that
112 * ends in 0-8 just add one
113 */
114 l = strlen(skey.seed);
115 if (l > 0) {
116 lastc = skey.seed[l - 1];
117 if (isdigit(lastc) && lastc != '9') {
118 strcpy(defaultseed, skey.seed);
119 defaultseed[l - 1] = lastc + 1;
120 }
121 if (isdigit(lastc) && lastc == '9' && l < 16) {
122 strcpy(defaultseed, skey.seed);
123 defaultseed[l - 1] = '0';
124 defaultseed[l] = '0';
125 defaultseed[l + 1] = '\0';
126 }
127 }
128 break;
129 case 1:
130 printf("[Adding %s]\n", pp->pw_name);
131 break;
132 }
133 n = 99;
134
135 if (!defaultsetup) {
136 printf("You need the 6 english words generated from the \"key\" command.\n");
137 for (i = 0;; i++) {
138 if (i >= 2)
139 exit(1);
140 printf("Enter sequence count from 1 to 10000: ");
141 fgets(tmp, sizeof(tmp), stdin);
142 n = atoi(tmp);
143 if (n > 0 && n < 10000)
144 break; /* Valid range */
145 printf("\n Error: Count must be > 0 and < 10000\n");
146 }
147 }
148 if (!defaultsetup) {
149 printf("Enter new key [default %s]: ", defaultseed);
150 fflush(stdout);
151 fgets(seed, sizeof(seed), stdin);
152 rip(seed);
153 if (strlen(seed) > 16) {
154 printf("Notice: Seed truncated to 16 characters.\n");
155 seed[16] = '\0';
156 }
157 if (seed[0] == '\0')
158 strcpy(seed, defaultseed);
159
160 for (i = 0;; i++) {
161 if (i >= 2)
162 exit(1);
163
164 printf("s/key %d %s\ns/key access password: ", n, seed);
165 fgets(tmp, sizeof(tmp), stdin);
166 rip(tmp);
167 backspace(tmp);
168
169 if (tmp[0] == '?') {
170 printf("Enter 6 English words from secure S/Key calculation.\n");
171 continue;
172 }
173 if (tmp[0] == '\0') {
174 exit(1);
175 }
176 if (etob(key, tmp) == 1 || atob8(key, tmp) == 0)
177 break; /* Valid format */
178 printf("Invalid format - try again with 6 English words.\n");
179 }
180 } else {
181 /* Get user's secret password */
182 for (i = 0;; i++) {
183 if (i >= 2)
184 exit(1);
185
186 printf("Enter secret password: ");
187 readpass(passwd, sizeof(passwd));
188 if (passwd[0] == '\0')
189 exit(1);
190
191 printf("Again secret password: ");
192 readpass(passwd2, sizeof(passwd));
193 if (passwd2[0] == '\0')
194 exit(1);
195
196 if (strlen(passwd) < 4 && strlen(passwd2) < 4)
197 err(1, "Your password must be longer");
198 if (strcmp(passwd, passwd2) == 0)
199 break;
200
201 printf("Passwords do not match.\n");
202 }
203 strcpy(seed, defaultseed);
204
205 /* Crunch seed and password into starting key */
206 if (keycrunch(key, seed, passwd) != 0)
207 err(2, "key crunch failed");
208 nn = n;
209 while (nn-- != 0)
210 f(key);
211 }
212 time(&now);
213 tm = localtime(&now);
214 strftime(tbuf, sizeof(tbuf), " %b %d,%Y %T", tm);
215
216 skey.val = (char *)malloc(16 + 1);
217
218 btoa8(skey.val, key);
219
220 fprintf(skey.keyfile, "%s %04d %-16s %s %-21s\n", pp->pw_name, n,
221 seed, skey.val, tbuf);
222 fclose(skey.keyfile);
223 printf("ID %s s/key is %d %s\n", pp->pw_name, n, seed);
224 printf("Next login password: %s\n", btoe(buf, key));
225 #ifdef HEXIN
226 printf("%s\n", put8(buf, key));
227 #endif
228
229 exit(1);
230 }
231