/* * Copyright Elliot Lee, 1996. All rights reserved. * Copyright Jan Rêkorajski, 1999. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, and the entire permission notice in its entirety, * including the disclaimer of warranties. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote * products derived from this software without specific prior * written permission. * * ALTERNATIVELY, this product may be distributed under the terms of * the GNU Public License, in which case the provisions of the GPL are * required INSTEAD OF the above restrictions. (This clause is * necessary due to a potential bad interaction between the GPL and * the restrictions contained in a BSD-style copyright.) * * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "config.h" #include #include #include #include #include #include #include #include #include /* for time() */ #include #include #ifdef WITH_SELINUX #include #define SELINUX_ENABLED is_selinux_enabled()>0 #endif #include /* indicate that the following groups are defined */ #define PAM_SM_ACCOUNT #include #include #ifndef LINUX_PAM #include #endif /* LINUX_PAM */ #include "support.h" #ifdef WITH_SELINUX struct spwd spwd; struct spwd *_unix_run_verify_binary(pam_handle_t *pamh, unsigned int ctrl, const char *user) { int retval=0, child, fds[2]; void (*sighandler)(int) = NULL; D(("running verify_binary")); /* create a pipe for the messages */ if (pipe(fds) != 0) { D(("could not make pipe")); _log_err(LOG_ERR, pamh, "Could not make pipe %s",strerror(errno)); return NULL; } D(("called.")); if (off(UNIX_NOREAP, ctrl)) { /* * This code arranges that the demise of the child does not cause * the application to receive a signal it is not expecting - which * may kill the application or worse. * * The "noreap" module argument is provided so that the admin can * override this behavior. */ sighandler = signal(SIGCHLD, SIG_DFL); } /* fork */ child = fork(); if (child == 0) { size_t i=0; struct rlimit rlim; static char *envp[] = { NULL }; char *args[] = { NULL, NULL, NULL, NULL }; close(0); close(1); /* reopen stdin as pipe */ close(fds[0]); dup2(fds[1], STDOUT_FILENO); /* XXX - should really tidy up PAM here too */ if (getrlimit(RLIMIT_NOFILE,&rlim)==0) { for (i=2; i < rlim.rlim_max; i++) { if ((unsigned int)fds[1] != i) { close(i); } } } /* exec binary helper */ args[0] = x_strdup(CHKPWD_HELPER); args[1] = x_strdup(user); args[2] = x_strdup("verify"); execve(CHKPWD_HELPER, args, envp); _log_err(LOG_ERR, pamh, "helper binary execve failed: %s",strerror(errno)); /* should not get here: exit with error */ close (fds[1]); D(("helper binary is not available")); exit(PAM_AUTHINFO_UNAVAIL); } else { close(fds[1]); if (child > 0) { char buf[1024]; int rc=0; rc=waitpid(child, &retval, 0); /* wait for helper to complete */ if (rc<0) { _log_err(LOG_ERR, pamh, "unix_chkpwd waitpid returned %d: %s", rc, strerror(errno)); retval = PAM_AUTH_ERR; } else { retval = WEXITSTATUS(retval); if (retval != PAM_AUTHINFO_UNAVAIL) { rc = _pammodutil_read(fds[0], buf, sizeof(buf) - 1); if(rc > 0) { buf[rc] = '\0'; if (sscanf(buf,"%ld:%ld:%ld:%ld:%ld:%ld", &spwd.sp_lstchg, /* last password change */ &spwd.sp_min, /* days until change allowed. */ &spwd.sp_max, /* days before change required */ &spwd.sp_warn, /* days warning for expiration */ &spwd.sp_inact, /* days before account inactive */ &spwd.sp_expire) /* date when account expires */ != 6 ) retval = PAM_AUTH_ERR; } else { _log_err(LOG_ERR, pamh, " ERROR %d:%s \n",rc, strerror(errno)); retval = PAM_AUTH_ERR; } } } } else { _log_err(LOG_ERR, pamh, "Fork failed %s \n",strerror(errno)); D(("fork failed")); retval = PAM_AUTH_ERR; } close(fds[0]); } if (sighandler != NULL) { (void) signal(SIGCHLD, sighandler); /* restore old signal handler */ } D(("Returning %d",retval)); if (retval != PAM_SUCCESS) { return NULL; } return &spwd; } #endif /* * PAM framework looks for this entry-point to pass control to the * account management module. */ PAM_EXTERN int pam_sm_acct_mgmt(pam_handle_t * pamh, int flags, int argc, const char **argv) { unsigned int ctrl; const void *uname; int retval, daysleft; time_t curdays; struct spwd *spent; struct passwd *pwent; char buf[256]; D(("called.")); ctrl = _set_ctrl(pamh, flags, NULL, argc, argv); retval = pam_get_item(pamh, PAM_USER, &uname); D(("user = `%s'", uname)); if (retval != PAM_SUCCESS || uname == NULL) { _log_err(LOG_ALERT, pamh ,"could not identify user (from uid=%d)" ,getuid()); return PAM_USER_UNKNOWN; } pwent = _pammodutil_getpwnam(pamh, uname); if (!pwent) { _log_err(LOG_ALERT, pamh ,"could not identify user (from getpwnam(%s))" ,uname); return PAM_USER_UNKNOWN; } if (!strcmp( pwent->pw_passwd, "*NP*" )) { /* NIS+ */ uid_t save_euid, save_uid; save_euid = geteuid(); save_uid = getuid(); if (save_uid == pwent->pw_uid) setreuid( save_euid, save_uid ); else { setreuid( 0, -1 ); if (setreuid( -1, pwent->pw_uid ) == -1) { setreuid( -1, 0 ); setreuid( 0, -1 ); if(setreuid( -1, pwent->pw_uid ) == -1) return PAM_CRED_INSUFFICIENT; } } spent = _pammodutil_getspnam (pamh, uname); if (save_uid == pwent->pw_uid) setreuid( save_uid, save_euid ); else { if (setreuid( -1, 0 ) == -1) setreuid( save_uid, -1 ); setreuid( -1, save_euid ); } } else if (_unix_shadowed (pwent)) spent = _pammodutil_getspnam (pamh, uname); else return PAM_SUCCESS; #ifdef WITH_SELINUX if (!spent && SELINUX_ENABLED ) spent = _unix_run_verify_binary(pamh, ctrl, uname); #endif if (!spent) if (on(UNIX_BROKEN_SHADOW,ctrl)) return PAM_SUCCESS; if (!spent) return PAM_AUTHINFO_UNAVAIL; /* Couldn't get username from shadow */ curdays = time(NULL) / (60 * 60 * 24); D(("today is %d, last change %d", curdays, spent->sp_lstchg)); if ((curdays > spent->sp_expire) && (spent->sp_expire != -1)) { _log_err(LOG_NOTICE, pamh ,"account %s has expired (account expired)" ,uname); _make_remark(pamh, ctrl, PAM_ERROR_MSG, _("Your account has expired; please contact your system administrator")); D(("account expired")); return PAM_ACCT_EXPIRED; } if (spent->sp_lstchg == 0) { _log_err(LOG_NOTICE, pamh ,"expired password for user %s (root enforced)" ,uname); _make_remark(pamh, ctrl, PAM_ERROR_MSG, _("You are required to change your password immediately (root enforced)")); D(("need a new password")); return PAM_NEW_AUTHTOK_REQD; } if (curdays < spent->sp_lstchg) { _log_err(LOG_DEBUG, pamh ,"account %s has password changed in future" ,uname); return PAM_SUCCESS; } if ((curdays - spent->sp_lstchg > spent->sp_max) && (curdays - spent->sp_lstchg > spent->sp_inact) && (curdays - spent->sp_lstchg > spent->sp_max + spent->sp_inact) && (spent->sp_max != -1) && (spent->sp_inact != -1)) { _log_err(LOG_NOTICE, pamh ,"account %s has expired (failed to change password)" ,uname); _make_remark(pamh, ctrl, PAM_ERROR_MSG, _("Your account has expired; please contact your system administrator")); D(("account expired 2")); return PAM_ACCT_EXPIRED; } if ((curdays - spent->sp_lstchg > spent->sp_max) && (spent->sp_max != -1)) { _log_err(LOG_DEBUG, pamh ,"expired password for user %s (password aged)" ,uname); _make_remark(pamh, ctrl, PAM_ERROR_MSG, _("You are required to change your password immediately (password aged)")); D(("need a new password 2")); return PAM_NEW_AUTHTOK_REQD; } if ((curdays - spent->sp_lstchg > spent->sp_max - spent->sp_warn) && (spent->sp_max != -1) && (spent->sp_warn != -1)) { daysleft = (spent->sp_lstchg + spent->sp_max) - curdays; _log_err(LOG_DEBUG, pamh ,"password for user %s will expire in %d days" ,uname, daysleft); snprintf(buf, sizeof (buf), _("Warning: your password will expire in %d day%.2s"), daysleft, daysleft == 1 ? "" : "s"); _make_remark(pamh, ctrl, PAM_TEXT_INFO, buf); } D(("all done")); return PAM_SUCCESS; } /* static module data */ #ifdef PAM_STATIC struct pam_module _pam_unix_acct_modstruct = { "pam_unix_acct", NULL, NULL, pam_sm_acct_mgmt, NULL, NULL, NULL, }; #endif