1b528cefcSMark Murray /* 2c19800e8SDoug Rabson * Copyright (c) 1997 - 2005 Kungliga Tekniska H�gskolan 3b528cefcSMark Murray * (Royal Institute of Technology, Stockholm, Sweden). 4b528cefcSMark Murray * All rights reserved. 5b528cefcSMark Murray * 6b528cefcSMark Murray * Redistribution and use in source and binary forms, with or without 7b528cefcSMark Murray * modification, are permitted provided that the following conditions 8b528cefcSMark Murray * are met: 9b528cefcSMark Murray * 10b528cefcSMark Murray * 1. Redistributions of source code must retain the above copyright 11b528cefcSMark Murray * notice, this list of conditions and the following disclaimer. 12b528cefcSMark Murray * 13b528cefcSMark Murray * 2. Redistributions in binary form must reproduce the above copyright 14b528cefcSMark Murray * notice, this list of conditions and the following disclaimer in the 15b528cefcSMark Murray * documentation and/or other materials provided with the distribution. 16b528cefcSMark Murray * 17b528cefcSMark Murray * 3. Neither the name of the Institute nor the names of its contributors 18b528cefcSMark Murray * may be used to endorse or promote products derived from this software 19b528cefcSMark Murray * without specific prior written permission. 20b528cefcSMark Murray * 21b528cefcSMark Murray * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22b528cefcSMark Murray * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23b528cefcSMark Murray * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24b528cefcSMark Murray * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25b528cefcSMark Murray * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26b528cefcSMark Murray * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27b528cefcSMark Murray * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28b528cefcSMark Murray * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29b528cefcSMark Murray * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30b528cefcSMark Murray * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31b528cefcSMark Murray * SUCH DAMAGE. 32b528cefcSMark Murray */ 33b528cefcSMark Murray 34b528cefcSMark Murray #include "krb5_locl.h" 35c19800e8SDoug Rabson #include <dirent.h> 36b528cefcSMark Murray 37c19800e8SDoug Rabson RCSID("$Id: kuserok.c 16048 2005-09-09 10:33:33Z lha $"); 38b528cefcSMark Murray 39c19800e8SDoug Rabson /* see if principal is mentioned in the filename access file, return 40c19800e8SDoug Rabson TRUE (in result) if so, FALSE otherwise */ 41b528cefcSMark Murray 42c19800e8SDoug Rabson static krb5_error_code 43c19800e8SDoug Rabson check_one_file(krb5_context context, 44c19800e8SDoug Rabson const char *filename, 45c19800e8SDoug Rabson struct passwd *pwd, 46c19800e8SDoug Rabson krb5_principal principal, 47c19800e8SDoug Rabson krb5_boolean *result) 48c19800e8SDoug Rabson { 49c19800e8SDoug Rabson FILE *f; 50c19800e8SDoug Rabson char buf[BUFSIZ]; 51c19800e8SDoug Rabson krb5_error_code ret; 52c19800e8SDoug Rabson struct stat st; 53c19800e8SDoug Rabson 54c19800e8SDoug Rabson *result = FALSE; 55c19800e8SDoug Rabson 56c19800e8SDoug Rabson f = fopen (filename, "r"); 57c19800e8SDoug Rabson if (f == NULL) 58c19800e8SDoug Rabson return errno; 59c19800e8SDoug Rabson 60c19800e8SDoug Rabson /* check type and mode of file */ 61c19800e8SDoug Rabson if (fstat(fileno(f), &st) != 0) { 62c19800e8SDoug Rabson fclose (f); 63c19800e8SDoug Rabson return errno; 64c19800e8SDoug Rabson } 65c19800e8SDoug Rabson if (S_ISDIR(st.st_mode)) { 66c19800e8SDoug Rabson fclose (f); 67c19800e8SDoug Rabson return EISDIR; 68c19800e8SDoug Rabson } 69c19800e8SDoug Rabson if (st.st_uid != pwd->pw_uid && st.st_uid != 0) { 70c19800e8SDoug Rabson fclose (f); 71c19800e8SDoug Rabson return EACCES; 72c19800e8SDoug Rabson } 73c19800e8SDoug Rabson if ((st.st_mode & (S_IWGRP | S_IWOTH)) != 0) { 74c19800e8SDoug Rabson fclose (f); 75c19800e8SDoug Rabson return EACCES; 76c19800e8SDoug Rabson } 77c19800e8SDoug Rabson 78c19800e8SDoug Rabson while (fgets (buf, sizeof(buf), f) != NULL) { 79c19800e8SDoug Rabson krb5_principal tmp; 80c19800e8SDoug Rabson char *newline = buf + strcspn(buf, "\n"); 81c19800e8SDoug Rabson 82c19800e8SDoug Rabson if(*newline != '\n') { 83c19800e8SDoug Rabson int c; 84c19800e8SDoug Rabson c = fgetc(f); 85c19800e8SDoug Rabson if(c != EOF) { 86c19800e8SDoug Rabson while(c != EOF && c != '\n') 87c19800e8SDoug Rabson c = fgetc(f); 88c19800e8SDoug Rabson /* line was too long, so ignore it */ 89c19800e8SDoug Rabson continue; 90c19800e8SDoug Rabson } 91c19800e8SDoug Rabson } 92c19800e8SDoug Rabson *newline = '\0'; 93c19800e8SDoug Rabson ret = krb5_parse_name (context, buf, &tmp); 94c19800e8SDoug Rabson if (ret) 95c19800e8SDoug Rabson continue; 96c19800e8SDoug Rabson *result = krb5_principal_compare (context, principal, tmp); 97c19800e8SDoug Rabson krb5_free_principal (context, tmp); 98c19800e8SDoug Rabson if (*result) { 99c19800e8SDoug Rabson fclose (f); 100c19800e8SDoug Rabson return 0; 101c19800e8SDoug Rabson } 102c19800e8SDoug Rabson } 103c19800e8SDoug Rabson fclose (f); 104c19800e8SDoug Rabson return 0; 105c19800e8SDoug Rabson } 106c19800e8SDoug Rabson 107c19800e8SDoug Rabson static krb5_error_code 108c19800e8SDoug Rabson check_directory(krb5_context context, 109c19800e8SDoug Rabson const char *dirname, 110c19800e8SDoug Rabson struct passwd *pwd, 111c19800e8SDoug Rabson krb5_principal principal, 112c19800e8SDoug Rabson krb5_boolean *result) 113c19800e8SDoug Rabson { 114c19800e8SDoug Rabson DIR *d; 115c19800e8SDoug Rabson struct dirent *dent; 116c19800e8SDoug Rabson char filename[MAXPATHLEN]; 117c19800e8SDoug Rabson krb5_error_code ret = 0; 118c19800e8SDoug Rabson struct stat st; 119c19800e8SDoug Rabson 120c19800e8SDoug Rabson *result = FALSE; 121c19800e8SDoug Rabson 122c19800e8SDoug Rabson if(lstat(dirname, &st) < 0) 123c19800e8SDoug Rabson return errno; 124c19800e8SDoug Rabson 125c19800e8SDoug Rabson if (!S_ISDIR(st.st_mode)) 126c19800e8SDoug Rabson return ENOTDIR; 127c19800e8SDoug Rabson 128c19800e8SDoug Rabson if (st.st_uid != pwd->pw_uid && st.st_uid != 0) 129c19800e8SDoug Rabson return EACCES; 130c19800e8SDoug Rabson if ((st.st_mode & (S_IWGRP | S_IWOTH)) != 0) 131c19800e8SDoug Rabson return EACCES; 132c19800e8SDoug Rabson 133c19800e8SDoug Rabson if((d = opendir(dirname)) == NULL) 134c19800e8SDoug Rabson return errno; 135c19800e8SDoug Rabson 136c19800e8SDoug Rabson #ifdef HAVE_DIRFD 137c19800e8SDoug Rabson { 138c19800e8SDoug Rabson int fd; 139c19800e8SDoug Rabson struct stat st2; 140c19800e8SDoug Rabson 141c19800e8SDoug Rabson fd = dirfd(d); 142c19800e8SDoug Rabson if(fstat(fd, &st2) < 0) { 143c19800e8SDoug Rabson closedir(d); 144c19800e8SDoug Rabson return errno; 145c19800e8SDoug Rabson } 146c19800e8SDoug Rabson if(st.st_dev != st2.st_dev || st.st_ino != st2.st_ino) { 147c19800e8SDoug Rabson closedir(d); 148c19800e8SDoug Rabson return EACCES; 149c19800e8SDoug Rabson } 150c19800e8SDoug Rabson } 151c19800e8SDoug Rabson #endif 152c19800e8SDoug Rabson 153c19800e8SDoug Rabson while((dent = readdir(d)) != NULL) { 154c19800e8SDoug Rabson if(strcmp(dent->d_name, ".") == 0 || 155c19800e8SDoug Rabson strcmp(dent->d_name, "..") == 0 || 156c19800e8SDoug Rabson dent->d_name[0] == '#' || /* emacs autosave */ 157c19800e8SDoug Rabson dent->d_name[strlen(dent->d_name) - 1] == '~') /* emacs backup */ 158c19800e8SDoug Rabson continue; 159c19800e8SDoug Rabson snprintf(filename, sizeof(filename), "%s/%s", dirname, dent->d_name); 160c19800e8SDoug Rabson ret = check_one_file(context, filename, pwd, principal, result); 161c19800e8SDoug Rabson if(ret == 0 && *result == TRUE) 162c19800e8SDoug Rabson break; 163c19800e8SDoug Rabson ret = 0; /* don't propagate errors upstream */ 164c19800e8SDoug Rabson } 165c19800e8SDoug Rabson closedir(d); 166c19800e8SDoug Rabson return ret; 167c19800e8SDoug Rabson } 168c19800e8SDoug Rabson 169c19800e8SDoug Rabson static krb5_boolean 170c19800e8SDoug Rabson match_local_principals(krb5_context context, 171b528cefcSMark Murray krb5_principal principal, 172b528cefcSMark Murray const char *luser) 173b528cefcSMark Murray { 174b528cefcSMark Murray krb5_error_code ret; 175c19800e8SDoug Rabson krb5_realm *realms, *r; 176c19800e8SDoug Rabson krb5_boolean result = FALSE; 177b528cefcSMark Murray 178c19800e8SDoug Rabson /* multi-component principals can never match */ 179c19800e8SDoug Rabson if(krb5_principal_get_comp_string(context, principal, 1) != NULL) 180bbd80c28SJacques Vidrine return FALSE; 181bbd80c28SJacques Vidrine 182b528cefcSMark Murray ret = krb5_get_default_realms (context, &realms); 183b528cefcSMark Murray if (ret) 184b528cefcSMark Murray return FALSE; 185b528cefcSMark Murray 186b528cefcSMark Murray for (r = realms; *r != NULL; ++r) { 187c19800e8SDoug Rabson if(strcmp(krb5_principal_get_realm(context, principal), 188c19800e8SDoug Rabson *r) != 0) 189c19800e8SDoug Rabson continue; 190c19800e8SDoug Rabson if(strcmp(krb5_principal_get_comp_string(context, principal, 0), 191c19800e8SDoug Rabson luser) == 0) { 192c19800e8SDoug Rabson result = TRUE; 193c19800e8SDoug Rabson break; 194c19800e8SDoug Rabson } 195c19800e8SDoug Rabson } 196b528cefcSMark Murray krb5_free_host_realm (context, realms); 197c19800e8SDoug Rabson return result; 198b528cefcSMark Murray } 199b528cefcSMark Murray 200c19800e8SDoug Rabson /** 201c19800e8SDoug Rabson * Return TRUE iff `principal' is allowed to login as `luser'. 202c19800e8SDoug Rabson */ 203c19800e8SDoug Rabson 204c19800e8SDoug Rabson krb5_boolean KRB5_LIB_FUNCTION 205c19800e8SDoug Rabson krb5_kuserok (krb5_context context, 206c19800e8SDoug Rabson krb5_principal principal, 207c19800e8SDoug Rabson const char *luser) 208c19800e8SDoug Rabson { 209c19800e8SDoug Rabson char *buf; 210c19800e8SDoug Rabson size_t buflen; 211c19800e8SDoug Rabson struct passwd *pwd; 212c19800e8SDoug Rabson krb5_error_code ret; 213c19800e8SDoug Rabson krb5_boolean result = FALSE; 214c19800e8SDoug Rabson 215c19800e8SDoug Rabson krb5_boolean found_file = FALSE; 216c19800e8SDoug Rabson 217c19800e8SDoug Rabson #ifdef POSIX_GETPWNAM_R 218c19800e8SDoug Rabson char pwbuf[2048]; 219c19800e8SDoug Rabson struct passwd pw; 220c19800e8SDoug Rabson 221c19800e8SDoug Rabson if(getpwnam_r(luser, &pw, pwbuf, sizeof(pwbuf), &pwd) != 0) 222c19800e8SDoug Rabson return FALSE; 223c19800e8SDoug Rabson #else 224c19800e8SDoug Rabson pwd = getpwnam (luser); 225c19800e8SDoug Rabson #endif 226c19800e8SDoug Rabson if (pwd == NULL) 227c19800e8SDoug Rabson return FALSE; 228c19800e8SDoug Rabson 229c19800e8SDoug Rabson #define KLOGIN "/.k5login" 230c19800e8SDoug Rabson buflen = strlen(pwd->pw_dir) + sizeof(KLOGIN) + 2; /* 2 for .d */ 231c19800e8SDoug Rabson buf = malloc(buflen); 232c19800e8SDoug Rabson if(buf == NULL) 233c19800e8SDoug Rabson return FALSE; 234c19800e8SDoug Rabson /* check user's ~/.k5login */ 235c19800e8SDoug Rabson strlcpy(buf, pwd->pw_dir, buflen); 236c19800e8SDoug Rabson strlcat(buf, KLOGIN, buflen); 237c19800e8SDoug Rabson ret = check_one_file(context, buf, pwd, principal, &result); 238c19800e8SDoug Rabson 239c19800e8SDoug Rabson if(ret == 0 && result == TRUE) { 240c19800e8SDoug Rabson free(buf); 241b528cefcSMark Murray return TRUE; 242b528cefcSMark Murray } 243b528cefcSMark Murray 244c19800e8SDoug Rabson if(ret != ENOENT) 245c19800e8SDoug Rabson found_file = TRUE; 246b528cefcSMark Murray 247c19800e8SDoug Rabson strlcat(buf, ".d", buflen); 248c19800e8SDoug Rabson ret = check_directory(context, buf, pwd, principal, &result); 249c19800e8SDoug Rabson free(buf); 250c19800e8SDoug Rabson if(ret == 0 && result == TRUE) 251b528cefcSMark Murray return TRUE; 252c19800e8SDoug Rabson 253c19800e8SDoug Rabson if(ret != ENOENT && ret != ENOTDIR) 254c19800e8SDoug Rabson found_file = TRUE; 255c19800e8SDoug Rabson 256c19800e8SDoug Rabson /* finally if no files exist, allow all principals matching 257c19800e8SDoug Rabson <localuser>@<LOCALREALM> */ 258c19800e8SDoug Rabson if(found_file == FALSE) 259c19800e8SDoug Rabson return match_local_principals(context, principal, luser); 260c19800e8SDoug Rabson 261b528cefcSMark Murray return FALSE; 262b528cefcSMark Murray } 263