xref: /freebsd/crypto/openssh/auth-sia.c (revision af23369a6deaaeb612ab266eb88b8bb8d560c322)
1 /*
2  * Copyright (c) 2002 Chris Adams.  All rights reserved.
3  *
4  * Redistribution and use in source and binary forms, with or without
5  * modification, are permitted provided that the following conditions
6  * are met:
7  * 1. Redistributions of source code must retain the above copyright
8  *    notice, this list of conditions and the following disclaimer.
9  * 2. Redistributions in binary form must reproduce the above copyright
10  *    notice, this list of conditions and the following disclaimer in the
11  *    documentation and/or other materials provided with the distribution.
12  *
13  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23  */
24 
25 #include "includes.h"
26 
27 #ifdef HAVE_OSF_SIA
28 #include <sia.h>
29 #include <siad.h>
30 #include <pwd.h>
31 #include <signal.h>
32 #include <setjmp.h>
33 #include <sys/resource.h>
34 #include <unistd.h>
35 #include <stdarg.h>
36 #include <string.h>
37 
38 #include "ssh.h"
39 #include "ssh_api.h"
40 #include "hostfile.h"
41 #include "auth.h"
42 #include "auth-sia.h"
43 #include "log.h"
44 #include "servconf.h"
45 #include "canohost.h"
46 #include "uidswap.h"
47 
48 extern ServerOptions options;
49 extern int saved_argc;
50 extern char **saved_argv;
51 
52 int
53 sys_auth_passwd(struct ssh *ssh, const char *pass)
54 {
55 	int ret;
56 	SIAENTITY *ent = NULL;
57 	const char *host;
58 	Authctxt *authctxt = ssh->authctxt;
59 
60 	host = get_canonical_hostname(options.use_dns);
61 
62 	if (!authctxt->user || pass == NULL || pass[0] == '\0')
63 		return (0);
64 
65 	if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
66 	    NULL, 0, NULL) != SIASUCCESS)
67 		return (0);
68 
69 	if ((ret = sia_ses_authent(NULL, pass, ent)) != SIASUCCESS) {
70 		error("Couldn't authenticate %s from %s",
71 		    authctxt->user, host);
72 		if (ret & SIASTOP)
73 			sia_ses_release(&ent);
74 
75 		return (0);
76 	}
77 
78 	sia_ses_release(&ent);
79 
80 	return (1);
81 }
82 
83 void
84 session_setup_sia(struct passwd *pw, char *tty)
85 {
86 	SIAENTITY *ent = NULL;
87 	const char *host;
88 
89 	host = get_canonical_hostname(options.use_dns);
90 
91 	if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name,
92 	    tty, 0, NULL) != SIASUCCESS)
93 		fatal("sia_ses_init failed");
94 
95 	if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) {
96 		sia_ses_release(&ent);
97 		fatal("sia_make_entity_pwd failed");
98 	}
99 
100 	ent->authtype = SIA_A_NONE;
101 	if (sia_ses_estab(sia_collect_trm, ent) != SIASUCCESS)
102 		fatal("Couldn't establish session for %s from %s",
103 		    pw->pw_name, host);
104 
105 	if (sia_ses_launch(sia_collect_trm, ent) != SIASUCCESS)
106 		fatal("Couldn't launch session for %s from %s",
107 		    pw->pw_name, host);
108 
109 	sia_ses_release(&ent);
110 
111 	setuid(0);
112 	permanently_set_uid(pw);
113 }
114 
115 #endif /* HAVE_OSF_SIA */
116