GCC Code Coverage Report
Directory: ./ Exec Total Coverage
File: libexec/login_lchpass/../../usr.bin/passwd/local_passwd.c Lines: 0 102 0.0 %
Date: 2017-11-13 Branches: 0 66 0.0 %

Line Branch Exec Source
1
/*	$OpenBSD: local_passwd.c,v 1.53 2016/12/30 23:32:14 millert Exp $	*/
2
3
/*-
4
 * Copyright (c) 1990 The Regents of the University of California.
5
 * All rights reserved.
6
 *
7
 * Redistribution and use in source and binary forms, with or without
8
 * modification, are permitted provided that the following conditions
9
 * are met:
10
 * 1. Redistributions of source code must retain the above copyright
11
 *    notice, this list of conditions and the following disclaimer.
12
 * 2. Redistributions in binary form must reproduce the above copyright
13
 *    notice, this list of conditions and the following disclaimer in the
14
 *    documentation and/or other materials provided with the distribution.
15
 * 3. Neither the name of the University nor the names of its contributors
16
 *    may be used to endorse or promote products derived from this software
17
 *    without specific prior written permission.
18
 *
19
 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29
 * SUCH DAMAGE.
30
 */
31
32
#include <sys/types.h>
33
#include <sys/stat.h>
34
#include <sys/uio.h>
35
36
#include <err.h>
37
#include <errno.h>
38
#include <fcntl.h>
39
#include <pwd.h>
40
#include <stdio.h>
41
#include <stdlib.h>
42
#include <signal.h>
43
#include <string.h>
44
#include <unistd.h>
45
#include <util.h>
46
#include <login_cap.h>
47
#include <readpassphrase.h>
48
49
#define UNCHANGED_MSG	"Password unchanged."
50
51
static uid_t uid;
52
extern int pwd_check(login_cap_t *, char *);
53
extern int pwd_gettries(login_cap_t *);
54
55
int local_passwd(char *, int);
56
char *getnewpasswd(struct passwd *, login_cap_t *, int);
57
void kbintr(int);
58
59
int
60
local_passwd(char *uname, int authenticated)
61
{
62
	struct passwd *pw, *opw;
63
	login_cap_t *lc;
64
	sigset_t fullset;
65
	time_t period;
66
	int i, pfd, tfd = -1;
67
	int pwflags = _PASSWORD_OMITV7;
68
69
	if (!(pw = getpwnam_shadow(uname))) {
70
		warnx("unknown user %s.", uname);
71
		return(1);
72
	}
73
74
	if (pledge("stdio rpath wpath cpath getpw tty id proc exec flock", NULL) == -1)
75
		err(1, "pledge");
76
77
	if ((opw = pw_dup(pw)) == NULL) {
78
		warn(NULL);
79
		return(1);
80
	}
81
	if ((lc = login_getclass(pw->pw_class)) == NULL) {
82
		warnx("unable to get login class for user %s.", uname);
83
		free(opw);
84
		return(1);
85
	}
86
87
	uid = authenticated ? pw->pw_uid : getuid();
88
	if (uid && uid != pw->pw_uid) {
89
		warnx("login/uid mismatch, username argument required.");
90
		free(opw);
91
		return(1);
92
	}
93
94
	/* Get the new password. */
95
	pw->pw_passwd = getnewpasswd(pw, lc, authenticated);
96
97
	if (pledge("stdio rpath wpath cpath getpw id proc exec flock", NULL) == -1)
98
		err(1, "pledge");
99
100
	/* Reset password change time based on login.conf. */
101
	period = (time_t)login_getcaptime(lc, "passwordtime", 0, 0);
102
	if (period > 0) {
103
		pw->pw_change = time(NULL) + period;
104
	} else {
105
		/*
106
		 * If the pw change time is the same we only need
107
		 * to update the spwd.db file.
108
		 */
109
		if (pw->pw_change != 0)
110
			pw->pw_change = 0;
111
		else
112
			pwflags = _PASSWORD_SECUREONLY;
113
	}
114
115
	/* Drop user's real uid and block all signals to avoid a DoS. */
116
	setuid(0);
117
	sigfillset(&fullset);
118
	sigdelset(&fullset, SIGINT);
119
	sigprocmask(SIG_BLOCK, &fullset, NULL);
120
121
	if (pledge("stdio rpath wpath cpath proc exec flock", NULL) == -1)
122
		err(1, "pledge");
123
124
	/* Get a lock on the passwd file and open it. */
125
	pw_init();
126
	for (i = 1; (tfd = pw_lock(0)) == -1; i++) {
127
		if (i == 4)
128
			(void)fputs("Attempting to lock password file, "
129
			    "please wait or press ^C to abort", stderr);
130
		(void)signal(SIGINT, kbintr);
131
		if (i % 16 == 0)
132
			fputc('.', stderr);
133
		usleep(250000);
134
		(void)signal(SIGINT, SIG_IGN);
135
	}
136
	if (i >= 4)
137
		fputc('\n', stderr);
138
	pfd = open(_PATH_MASTERPASSWD, O_RDONLY | O_CLOEXEC, 0);
139
	if (pfd < 0)
140
		pw_error(_PATH_MASTERPASSWD, 1, 1);
141
142
	/* Update master.passwd file and rebuild spwd.db. */
143
	pw_copy(pfd, tfd, pw, opw);
144
	free(opw);
145
	if (pw_mkdb(uname, pwflags) < 0)
146
		pw_error(NULL, 0, 1);
147
148
	return(0);
149
}
150
151
char *
152
getnewpasswd(struct passwd *pw, login_cap_t *lc, int authenticated)
153
{
154
	static char hash[_PASSWORD_LEN];
155
	char newpass[1024];
156
	char *p, *pref;
157
	int tries, pwd_tries;
158
	sig_t saveint, savequit;
159
160
	saveint = signal(SIGINT, kbintr);
161
	savequit = signal(SIGQUIT, kbintr);
162
163
	if (!authenticated) {
164
		(void)printf("Changing password for %s.\n", pw->pw_name);
165
		if (uid != 0 && pw->pw_passwd[0] != '\0') {
166
			char oldpass[1024];
167
168
			p = readpassphrase("Old password:", oldpass,
169
			    sizeof(oldpass), RPP_ECHO_OFF);
170
			if (p == NULL || *p == '\0') {
171
				(void)printf("%s\n", UNCHANGED_MSG);
172
				pw_abort();
173
				exit(p == NULL ? 1 : 0);
174
			}
175
			if (crypt_checkpass(p, pw->pw_passwd) != 0) {
176
				errno = EACCES;
177
				explicit_bzero(oldpass, sizeof(oldpass));
178
				pw_error(NULL, 1, 1);
179
			}
180
			explicit_bzero(oldpass, sizeof(oldpass));
181
		}
182
	}
183
184
	pwd_tries = pwd_gettries(lc);
185
186
	for (newpass[0] = '\0', tries = 0;;) {
187
		char repeat[1024];
188
189
		p = readpassphrase("New password:", newpass, sizeof(newpass),
190
		    RPP_ECHO_OFF);
191
		if (p == NULL || *p == '\0') {
192
			(void)printf("%s\n", UNCHANGED_MSG);
193
			pw_abort();
194
			exit(p == NULL ? 1 : 0);
195
		}
196
		if (strcmp(p, "s/key") == 0) {
197
			printf("That password collides with a system feature. Choose another.\n");
198
			continue;
199
		}
200
201
		if ((tries++ < pwd_tries || pwd_tries == 0) &&
202
		    pwd_check(lc, p) == 0)
203
			continue;
204
		p = readpassphrase("Retype new password:", repeat, sizeof(repeat),
205
		    RPP_ECHO_OFF);
206
		if (p != NULL && strcmp(newpass, p) == 0) {
207
			explicit_bzero(repeat, sizeof(repeat));
208
			break;
209
		}
210
		(void)printf("Mismatch; try again, EOF to quit.\n");
211
		explicit_bzero(repeat, sizeof(repeat));
212
		explicit_bzero(newpass, sizeof(newpass));
213
	}
214
215
	(void)signal(SIGINT, saveint);
216
	(void)signal(SIGQUIT, savequit);
217
218
	pref = login_getcapstr(lc, "localcipher", NULL, NULL);
219
	if (crypt_newhash(newpass, pref, hash, sizeof(hash)) != 0) {
220
		(void)printf("Couldn't generate hash.\n");
221
		explicit_bzero(newpass, sizeof(newpass));
222
		pw_error(NULL, 0, 0);
223
	}
224
	explicit_bzero(newpass, sizeof(newpass));
225
	free(pref);
226
	return hash;
227
}
228
229
void
230
kbintr(int signo)
231
{
232
	dprintf(STDOUT_FILENO, "\n%s\n", UNCHANGED_MSG);
233
	_exit(0);
234
}