1 |
|
|
/* $OpenBSD: local_passwd.c,v 1.53 2016/12/30 23:32:14 millert Exp $ */ |
2 |
|
|
|
3 |
|
|
/*- |
4 |
|
|
* Copyright (c) 1990 The Regents of the University of California. |
5 |
|
|
* All rights reserved. |
6 |
|
|
* |
7 |
|
|
* Redistribution and use in source and binary forms, with or without |
8 |
|
|
* modification, are permitted provided that the following conditions |
9 |
|
|
* are met: |
10 |
|
|
* 1. Redistributions of source code must retain the above copyright |
11 |
|
|
* notice, this list of conditions and the following disclaimer. |
12 |
|
|
* 2. Redistributions in binary form must reproduce the above copyright |
13 |
|
|
* notice, this list of conditions and the following disclaimer in the |
14 |
|
|
* documentation and/or other materials provided with the distribution. |
15 |
|
|
* 3. Neither the name of the University nor the names of its contributors |
16 |
|
|
* may be used to endorse or promote products derived from this software |
17 |
|
|
* without specific prior written permission. |
18 |
|
|
* |
19 |
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
20 |
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
21 |
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
22 |
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
23 |
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
24 |
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
25 |
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
26 |
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
27 |
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
28 |
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
29 |
|
|
* SUCH DAMAGE. |
30 |
|
|
*/ |
31 |
|
|
|
32 |
|
|
#include <sys/types.h> |
33 |
|
|
#include <sys/stat.h> |
34 |
|
|
#include <sys/uio.h> |
35 |
|
|
|
36 |
|
|
#include <err.h> |
37 |
|
|
#include <errno.h> |
38 |
|
|
#include <fcntl.h> |
39 |
|
|
#include <pwd.h> |
40 |
|
|
#include <stdio.h> |
41 |
|
|
#include <stdlib.h> |
42 |
|
|
#include <signal.h> |
43 |
|
|
#include <string.h> |
44 |
|
|
#include <unistd.h> |
45 |
|
|
#include <util.h> |
46 |
|
|
#include <login_cap.h> |
47 |
|
|
#include <readpassphrase.h> |
48 |
|
|
|
49 |
|
|
#define UNCHANGED_MSG "Password unchanged." |
50 |
|
|
|
51 |
|
|
static uid_t uid; |
52 |
|
|
extern int pwd_check(login_cap_t *, char *); |
53 |
|
|
extern int pwd_gettries(login_cap_t *); |
54 |
|
|
|
55 |
|
|
int local_passwd(char *, int); |
56 |
|
|
char *getnewpasswd(struct passwd *, login_cap_t *, int); |
57 |
|
|
void kbintr(int); |
58 |
|
|
|
59 |
|
|
int |
60 |
|
|
local_passwd(char *uname, int authenticated) |
61 |
|
|
{ |
62 |
|
|
struct passwd *pw, *opw; |
63 |
|
|
login_cap_t *lc; |
64 |
|
|
sigset_t fullset; |
65 |
|
|
time_t period; |
66 |
|
|
int i, pfd, tfd = -1; |
67 |
|
|
int pwflags = _PASSWORD_OMITV7; |
68 |
|
|
|
69 |
|
|
if (!(pw = getpwnam_shadow(uname))) { |
70 |
|
|
warnx("unknown user %s.", uname); |
71 |
|
|
return(1); |
72 |
|
|
} |
73 |
|
|
|
74 |
|
|
if (pledge("stdio rpath wpath cpath getpw tty id proc exec flock", NULL) == -1) |
75 |
|
|
err(1, "pledge"); |
76 |
|
|
|
77 |
|
|
if ((opw = pw_dup(pw)) == NULL) { |
78 |
|
|
warn(NULL); |
79 |
|
|
return(1); |
80 |
|
|
} |
81 |
|
|
if ((lc = login_getclass(pw->pw_class)) == NULL) { |
82 |
|
|
warnx("unable to get login class for user %s.", uname); |
83 |
|
|
free(opw); |
84 |
|
|
return(1); |
85 |
|
|
} |
86 |
|
|
|
87 |
|
|
uid = authenticated ? pw->pw_uid : getuid(); |
88 |
|
|
if (uid && uid != pw->pw_uid) { |
89 |
|
|
warnx("login/uid mismatch, username argument required."); |
90 |
|
|
free(opw); |
91 |
|
|
return(1); |
92 |
|
|
} |
93 |
|
|
|
94 |
|
|
/* Get the new password. */ |
95 |
|
|
pw->pw_passwd = getnewpasswd(pw, lc, authenticated); |
96 |
|
|
|
97 |
|
|
if (pledge("stdio rpath wpath cpath getpw id proc exec flock", NULL) == -1) |
98 |
|
|
err(1, "pledge"); |
99 |
|
|
|
100 |
|
|
/* Reset password change time based on login.conf. */ |
101 |
|
|
period = (time_t)login_getcaptime(lc, "passwordtime", 0, 0); |
102 |
|
|
if (period > 0) { |
103 |
|
|
pw->pw_change = time(NULL) + period; |
104 |
|
|
} else { |
105 |
|
|
/* |
106 |
|
|
* If the pw change time is the same we only need |
107 |
|
|
* to update the spwd.db file. |
108 |
|
|
*/ |
109 |
|
|
if (pw->pw_change != 0) |
110 |
|
|
pw->pw_change = 0; |
111 |
|
|
else |
112 |
|
|
pwflags = _PASSWORD_SECUREONLY; |
113 |
|
|
} |
114 |
|
|
|
115 |
|
|
/* Drop user's real uid and block all signals to avoid a DoS. */ |
116 |
|
|
setuid(0); |
117 |
|
|
sigfillset(&fullset); |
118 |
|
|
sigdelset(&fullset, SIGINT); |
119 |
|
|
sigprocmask(SIG_BLOCK, &fullset, NULL); |
120 |
|
|
|
121 |
|
|
if (pledge("stdio rpath wpath cpath proc exec flock", NULL) == -1) |
122 |
|
|
err(1, "pledge"); |
123 |
|
|
|
124 |
|
|
/* Get a lock on the passwd file and open it. */ |
125 |
|
|
pw_init(); |
126 |
|
|
for (i = 1; (tfd = pw_lock(0)) == -1; i++) { |
127 |
|
|
if (i == 4) |
128 |
|
|
(void)fputs("Attempting to lock password file, " |
129 |
|
|
"please wait or press ^C to abort", stderr); |
130 |
|
|
(void)signal(SIGINT, kbintr); |
131 |
|
|
if (i % 16 == 0) |
132 |
|
|
fputc('.', stderr); |
133 |
|
|
usleep(250000); |
134 |
|
|
(void)signal(SIGINT, SIG_IGN); |
135 |
|
|
} |
136 |
|
|
if (i >= 4) |
137 |
|
|
fputc('\n', stderr); |
138 |
|
|
pfd = open(_PATH_MASTERPASSWD, O_RDONLY | O_CLOEXEC, 0); |
139 |
|
|
if (pfd < 0) |
140 |
|
|
pw_error(_PATH_MASTERPASSWD, 1, 1); |
141 |
|
|
|
142 |
|
|
/* Update master.passwd file and rebuild spwd.db. */ |
143 |
|
|
pw_copy(pfd, tfd, pw, opw); |
144 |
|
|
free(opw); |
145 |
|
|
if (pw_mkdb(uname, pwflags) < 0) |
146 |
|
|
pw_error(NULL, 0, 1); |
147 |
|
|
|
148 |
|
|
return(0); |
149 |
|
|
} |
150 |
|
|
|
151 |
|
|
char * |
152 |
|
|
getnewpasswd(struct passwd *pw, login_cap_t *lc, int authenticated) |
153 |
|
|
{ |
154 |
|
|
static char hash[_PASSWORD_LEN]; |
155 |
|
|
char newpass[1024]; |
156 |
|
|
char *p, *pref; |
157 |
|
|
int tries, pwd_tries; |
158 |
|
|
sig_t saveint, savequit; |
159 |
|
|
|
160 |
|
|
saveint = signal(SIGINT, kbintr); |
161 |
|
|
savequit = signal(SIGQUIT, kbintr); |
162 |
|
|
|
163 |
|
|
if (!authenticated) { |
164 |
|
|
(void)printf("Changing password for %s.\n", pw->pw_name); |
165 |
|
|
if (uid != 0 && pw->pw_passwd[0] != '\0') { |
166 |
|
|
char oldpass[1024]; |
167 |
|
|
|
168 |
|
|
p = readpassphrase("Old password:", oldpass, |
169 |
|
|
sizeof(oldpass), RPP_ECHO_OFF); |
170 |
|
|
if (p == NULL || *p == '\0') { |
171 |
|
|
(void)printf("%s\n", UNCHANGED_MSG); |
172 |
|
|
pw_abort(); |
173 |
|
|
exit(p == NULL ? 1 : 0); |
174 |
|
|
} |
175 |
|
|
if (crypt_checkpass(p, pw->pw_passwd) != 0) { |
176 |
|
|
errno = EACCES; |
177 |
|
|
explicit_bzero(oldpass, sizeof(oldpass)); |
178 |
|
|
pw_error(NULL, 1, 1); |
179 |
|
|
} |
180 |
|
|
explicit_bzero(oldpass, sizeof(oldpass)); |
181 |
|
|
} |
182 |
|
|
} |
183 |
|
|
|
184 |
|
|
pwd_tries = pwd_gettries(lc); |
185 |
|
|
|
186 |
|
|
for (newpass[0] = '\0', tries = 0;;) { |
187 |
|
|
char repeat[1024]; |
188 |
|
|
|
189 |
|
|
p = readpassphrase("New password:", newpass, sizeof(newpass), |
190 |
|
|
RPP_ECHO_OFF); |
191 |
|
|
if (p == NULL || *p == '\0') { |
192 |
|
|
(void)printf("%s\n", UNCHANGED_MSG); |
193 |
|
|
pw_abort(); |
194 |
|
|
exit(p == NULL ? 1 : 0); |
195 |
|
|
} |
196 |
|
|
if (strcmp(p, "s/key") == 0) { |
197 |
|
|
printf("That password collides with a system feature. Choose another.\n"); |
198 |
|
|
continue; |
199 |
|
|
} |
200 |
|
|
|
201 |
|
|
if ((tries++ < pwd_tries || pwd_tries == 0) && |
202 |
|
|
pwd_check(lc, p) == 0) |
203 |
|
|
continue; |
204 |
|
|
p = readpassphrase("Retype new password:", repeat, sizeof(repeat), |
205 |
|
|
RPP_ECHO_OFF); |
206 |
|
|
if (p != NULL && strcmp(newpass, p) == 0) { |
207 |
|
|
explicit_bzero(repeat, sizeof(repeat)); |
208 |
|
|
break; |
209 |
|
|
} |
210 |
|
|
(void)printf("Mismatch; try again, EOF to quit.\n"); |
211 |
|
|
explicit_bzero(repeat, sizeof(repeat)); |
212 |
|
|
explicit_bzero(newpass, sizeof(newpass)); |
213 |
|
|
} |
214 |
|
|
|
215 |
|
|
(void)signal(SIGINT, saveint); |
216 |
|
|
(void)signal(SIGQUIT, savequit); |
217 |
|
|
|
218 |
|
|
pref = login_getcapstr(lc, "localcipher", NULL, NULL); |
219 |
|
|
if (crypt_newhash(newpass, pref, hash, sizeof(hash)) != 0) { |
220 |
|
|
(void)printf("Couldn't generate hash.\n"); |
221 |
|
|
explicit_bzero(newpass, sizeof(newpass)); |
222 |
|
|
pw_error(NULL, 0, 0); |
223 |
|
|
} |
224 |
|
|
explicit_bzero(newpass, sizeof(newpass)); |
225 |
|
|
free(pref); |
226 |
|
|
return hash; |
227 |
|
|
} |
228 |
|
|
|
229 |
|
|
void |
230 |
|
|
kbintr(int signo) |
231 |
|
|
{ |
232 |
|
|
dprintf(STDOUT_FILENO, "\n%s\n", UNCHANGED_MSG); |
233 |
|
|
_exit(0); |
234 |
|
|
} |