/* * pam_shells module * * by Erik Troan , Red Hat Software. * August 5, 1996. * This code shamelessly ripped from the pam_securetty module. */ #include "config.h" #include #include #include #include #include #include #include #include #include #if defined (USE_ECONF) && defined (VENDORDIR) #include #endif #include #include #include #define SHELL_FILE "/etc/shells" #define SHELLS "shells" #define ETCDIR "/etc" #define DEFAULT_SHELL "/bin/sh" static bool check_file(const char *filename, const void *pamh) { struct stat sb; if (stat(filename, &sb)) { pam_syslog(pamh, LOG_ERR, "Cannot stat %s: %m", filename); return false; /* must have /etc/shells */ } if ((sb.st_mode & S_IWOTH) || !S_ISREG(sb.st_mode)) { pam_syslog(pamh, LOG_ERR, "%s is either world writable or not a normal file", filename); return false; } return true; } static int perform_check(pam_handle_t *pamh) { int retval = PAM_AUTH_ERR; const char *userName; const char *userShell; struct passwd * pw; retval = pam_get_user(pamh, &userName, NULL); if (retval != PAM_SUCCESS) { return PAM_SERVICE_ERR; } pw = pam_modutil_getpwnam(pamh, userName); if (pw == NULL || pw->pw_shell == NULL) { return PAM_AUTH_ERR; /* user doesn't exist */ } userShell = pw->pw_shell; if (userShell[0] == '\0') userShell = DEFAULT_SHELL; #if defined (USE_ECONF) && defined (VENDORDIR) size_t size = 0; econf_err error; char **keys; econf_file *key_file; error = econf_readDirsWithCallback(&key_file, VENDORDIR, ETCDIR, SHELLS, NULL, "", /* key only */ "#", /* comment */ check_file, pamh); if (error) { pam_syslog(pamh, LOG_ERR, "Cannot parse shell files: %s", econf_errString(error)); return PAM_AUTH_ERR; } error = econf_getKeys(key_file, NULL, &size, &keys); if (error) { pam_syslog(pamh, LOG_ERR, "Cannot evaluate entries in shell files: %s", econf_errString(error)); econf_free (key_file); return PAM_AUTH_ERR; } retval = 1; for (size_t i = 0; i < size; i++) { retval = strcmp(keys[i], userShell); if (!retval) break; } econf_free (key_file); #else char shellFileLine[256]; FILE * shellFile; if (!check_file(SHELL_FILE, pamh)) return PAM_AUTH_ERR; shellFile = fopen(SHELL_FILE,"r"); if (shellFile == NULL) { /* Check that we opened it successfully */ pam_syslog(pamh, LOG_ERR, "Error opening %s: %m", SHELL_FILE); return PAM_SERVICE_ERR; } retval = 1; while(retval && (fgets(shellFileLine, 255, shellFile) != NULL)) { if (shellFileLine[strlen(shellFileLine) - 1] == '\n') shellFileLine[strlen(shellFileLine) - 1] = '\0'; retval = strcmp(shellFileLine, userShell); } fclose(shellFile); #endif if (retval) { return PAM_AUTH_ERR; } else { return PAM_SUCCESS; } } /* --- authentication management functions (only) --- */ int pam_sm_authenticate(pam_handle_t *pamh, int flags UNUSED, int argc UNUSED, const char **argv UNUSED) { return perform_check(pamh); } int pam_sm_setcred(pam_handle_t *pamh UNUSED, int flags UNUSED, int argc UNUSED, const char **argv UNUSED) { return PAM_SUCCESS; } /* --- account management functions (only) --- */ int pam_sm_acct_mgmt(pam_handle_t *pamh, int flags UNUSED, int argc UNUSED, const char **argv UNUSED) { return perform_check(pamh); } /* end of module definition */