1 /* 2 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * All rights reserved 5 * Created: Fri Mar 17 17:09:28 1995 ylo 6 * This program is the ssh daemon. It listens for connections from clients, and 7 * performs authentication, executes use commands or shell, and forwards 8 * information to/from the application to the user client over an encrypted 9 * connection. This can also handle forwarding of X11, TCP/IP, and authentication 10 * agent connections. 11 * 12 * $FreeBSD$ 13 */ 14 15 #include "includes.h" 16 RCSID("$OpenBSD: sshd.c,v 1.88 2000/02/15 16:52:57 markus Exp $"); 17 18 #include "xmalloc.h" 19 #include "rsa.h" 20 #include "ssh.h" 21 #include "pty.h" 22 #include "packet.h" 23 #include "buffer.h" 24 #include "cipher.h" 25 #include "mpaux.h" 26 #include "servconf.h" 27 #include "uidswap.h" 28 #include "compat.h" 29 #include <poll.h> 30 #include <time.h> 31 32 #ifdef LIBWRAP 33 #include <tcpd.h> 34 #include <syslog.h> 35 int allow_severity = LOG_INFO; 36 int deny_severity = LOG_WARNING; 37 #endif /* LIBWRAP */ 38 39 #ifdef __FreeBSD__ 40 #define LOGIN_CAP 41 #define _PATH_CHPASS "/usr/bin/passwd" 42 #endif /* __FreeBSD__ */ 43 44 #ifdef LOGIN_CAP 45 #include <login_cap.h> 46 #endif /* LOGIN_CAP */ 47 48 #ifndef O_NOCTTY 49 #define O_NOCTTY 0 50 #endif 51 52 #ifdef KRB5 53 #include <krb5.h> 54 krb5_context ssh_context = NULL; 55 krb5_principal tkt_client = NULL; /* Principal from the received ticket. 56 Also is used as an indication of succesful krb5 authentization. */ 57 #endif /* KRB5 */ 58 59 60 /* Local Xauthority file. */ 61 static char *xauthfile = NULL; 62 63 /* Server configuration options. */ 64 ServerOptions options; 65 66 /* Name of the server configuration file. */ 67 char *config_file_name = SERVER_CONFIG_FILE; 68 69 /* 70 * Flag indicating whether IPv4 or IPv6. This can be set on the command line. 71 * Default value is AF_UNSPEC means both IPv4 and IPv6. 72 */ 73 int IPv4or6 = AF_UNSPEC; 74 75 /* 76 * Debug mode flag. This can be set on the command line. If debug 77 * mode is enabled, extra debugging output will be sent to the system 78 * log, the daemon will not go to background, and will exit after processing 79 * the first connection. 80 */ 81 int debug_flag = 0; 82 83 /* Flag indicating that the daemon is being started from inetd. */ 84 int inetd_flag = 0; 85 86 /* debug goes to stderr unless inetd_flag is set */ 87 int log_stderr = 0; 88 89 /* argv[0] without path. */ 90 char *av0; 91 92 /* Saved arguments to main(). */ 93 char **saved_argv; 94 95 /* 96 * The sockets that the server is listening; this is used in the SIGHUP 97 * signal handler. 98 */ 99 #define MAX_LISTEN_SOCKS 16 100 int listen_socks[MAX_LISTEN_SOCKS]; 101 int num_listen_socks = 0; 102 103 /* 104 * the client's version string, passed by sshd2 in compat mode. if != NULL, 105 * sshd will skip the version-number exchange 106 */ 107 char *client_version_string = NULL; 108 109 /* Flags set in auth-rsa from authorized_keys flags. These are set in auth-rsa.c. */ 110 int no_port_forwarding_flag = 0; 111 int no_agent_forwarding_flag = 0; 112 int no_x11_forwarding_flag = 0; 113 int no_pty_flag = 0; 114 115 /* RSA authentication "command=" option. */ 116 char *forced_command = NULL; 117 118 /* RSA authentication "environment=" options. */ 119 struct envstring *custom_environment = NULL; 120 121 /* Session id for the current session. */ 122 unsigned char session_id[16]; 123 124 /* 125 * Any really sensitive data in the application is contained in this 126 * structure. The idea is that this structure could be locked into memory so 127 * that the pages do not get written into swap. However, there are some 128 * problems. The private key contains BIGNUMs, and we do not (in principle) 129 * have access to the internals of them, and locking just the structure is 130 * not very useful. Currently, memory locking is not implemented. 131 */ 132 struct { 133 RSA *private_key; /* Private part of server key. */ 134 RSA *host_key; /* Private part of host key. */ 135 } sensitive_data; 136 137 /* 138 * Flag indicating whether the current session key has been used. This flag 139 * is set whenever the key is used, and cleared when the key is regenerated. 140 */ 141 int key_used = 0; 142 143 /* This is set to true when SIGHUP is received. */ 144 int received_sighup = 0; 145 146 /* Public side of the server key. This value is regenerated regularly with 147 the private key. */ 148 RSA *public_key; 149 150 /* These are used to implement connections_per_period. */ 151 struct magic_connection { 152 struct timeval connections_begin; 153 unsigned int connections_this_period; 154 } *magic_connections; 155 /* Magic number, too! TODO: this doesn't have to be static. */ 156 const size_t MAGIC_CONNECTIONS_SIZE = 1; 157 158 static __inline int 159 magic_hash(struct sockaddr *sa) { 160 161 return 0; 162 } 163 164 static __inline struct timeval 165 timevaldiff(struct timeval *tv1, struct timeval *tv2) { 166 struct timeval diff; 167 int carry; 168 169 carry = tv1->tv_usec > tv2->tv_usec; 170 diff.tv_sec = tv2->tv_sec - tv1->tv_sec - (carry ? 0 : 1); 171 diff.tv_usec = tv2->tv_usec - tv1->tv_usec + (carry ? 1000000 : 0); 172 173 return diff; 174 } 175 176 /* Prototypes for various functions defined later in this file. */ 177 void do_ssh_kex(); 178 void do_authentication(); 179 void do_authloop(struct passwd * pw); 180 void do_fake_authloop(char *user); 181 void do_authenticated(struct passwd * pw); 182 void do_exec_pty(const char *command, int ptyfd, int ttyfd, 183 const char *ttyname, struct passwd * pw, const char *term, 184 const char *display, const char *auth_proto, 185 const char *auth_data); 186 void do_exec_no_pty(const char *command, struct passwd * pw, 187 const char *display, const char *auth_proto, 188 const char *auth_data); 189 void do_child(const char *command, struct passwd * pw, const char *term, 190 const char *display, const char *auth_proto, 191 const char *auth_data, const char *ttyname); 192 193 /* 194 * Remove local Xauthority file. 195 */ 196 void 197 xauthfile_cleanup_proc(void *ignore) 198 { 199 debug("xauthfile_cleanup_proc called"); 200 201 if (xauthfile != NULL) { 202 char *p; 203 unlink(xauthfile); 204 p = strrchr(xauthfile, '/'); 205 if (p != NULL) { 206 *p = '\0'; 207 rmdir(xauthfile); 208 } 209 xfree(xauthfile); 210 xauthfile = NULL; 211 } 212 } 213 214 /* 215 * Close all listening sockets 216 */ 217 void 218 close_listen_socks(void) 219 { 220 int i; 221 for (i = 0; i < num_listen_socks; i++) 222 close(listen_socks[i]); 223 num_listen_socks = -1; 224 } 225 226 /* 227 * Signal handler for SIGHUP. Sshd execs itself when it receives SIGHUP; 228 * the effect is to reread the configuration file (and to regenerate 229 * the server key). 230 */ 231 void 232 sighup_handler(int sig) 233 { 234 received_sighup = 1; 235 signal(SIGHUP, sighup_handler); 236 } 237 238 /* 239 * Called from the main program after receiving SIGHUP. 240 * Restarts the server. 241 */ 242 void 243 sighup_restart() 244 { 245 log("Received SIGHUP; restarting."); 246 close_listen_socks(); 247 execv(saved_argv[0], saved_argv); 248 log("RESTART FAILED: av0='%s', error: %s.", av0, strerror(errno)); 249 exit(1); 250 } 251 252 /* 253 * Generic signal handler for terminating signals in the master daemon. 254 * These close the listen socket; not closing it seems to cause "Address 255 * already in use" problems on some machines, which is inconvenient. 256 */ 257 void 258 sigterm_handler(int sig) 259 { 260 log("Received signal %d; terminating.", sig); 261 close_listen_socks(); 262 exit(255); 263 } 264 265 /* 266 * SIGCHLD handler. This is called whenever a child dies. This will then 267 * reap any zombies left by exited c. 268 */ 269 void 270 main_sigchld_handler(int sig) 271 { 272 int save_errno = errno; 273 int status; 274 275 while (waitpid(-1, &status, WNOHANG) > 0) 276 ; 277 278 signal(SIGCHLD, main_sigchld_handler); 279 errno = save_errno; 280 } 281 282 /* 283 * Signal handler for the alarm after the login grace period has expired. 284 */ 285 void 286 grace_alarm_handler(int sig) 287 { 288 /* Close the connection. */ 289 packet_close(); 290 291 /* Log error and exit. */ 292 fatal("Timeout before authentication for %s.", get_remote_ipaddr()); 293 } 294 295 /* 296 * convert ssh auth msg type into description 297 */ 298 char * 299 get_authname(int type) 300 { 301 static char buf[1024]; 302 switch (type) { 303 case SSH_CMSG_AUTH_PASSWORD: 304 return "password"; 305 case SSH_CMSG_AUTH_RSA: 306 return "rsa"; 307 case SSH_CMSG_AUTH_RHOSTS_RSA: 308 return "rhosts-rsa"; 309 case SSH_CMSG_AUTH_RHOSTS: 310 return "rhosts"; 311 #ifdef KRB4 312 case SSH_CMSG_AUTH_KRB4: 313 return "kerberosV4"; 314 #endif 315 #ifdef KRB5 316 case SSH_CMSG_AUTH_KRB5: 317 return "kerberosV5"; 318 #endif /* KRB5 */ 319 #ifdef SKEY 320 case SSH_CMSG_AUTH_TIS_RESPONSE: 321 return "s/key"; 322 #endif 323 } 324 snprintf(buf, sizeof buf, "bad-auth-msg-%d", type); 325 return buf; 326 } 327 328 /* 329 * Signal handler for the key regeneration alarm. Note that this 330 * alarm only occurs in the daemon waiting for connections, and it does not 331 * do anything with the private key or random state before forking. 332 * Thus there should be no concurrency control/asynchronous execution 333 * problems. 334 */ 335 void 336 key_regeneration_alarm(int sig) 337 { 338 int save_errno = errno; 339 340 /* Check if we should generate a new key. */ 341 if (key_used) { 342 /* This should really be done in the background. */ 343 log("Generating new %d bit RSA key.", options.server_key_bits); 344 345 if (sensitive_data.private_key != NULL) 346 RSA_free(sensitive_data.private_key); 347 sensitive_data.private_key = RSA_new(); 348 349 if (public_key != NULL) 350 RSA_free(public_key); 351 public_key = RSA_new(); 352 353 rsa_generate_key(sensitive_data.private_key, public_key, 354 options.server_key_bits); 355 arc4random_stir(); 356 key_used = 0; 357 log("RSA key generation complete."); 358 } 359 /* Reschedule the alarm. */ 360 signal(SIGALRM, key_regeneration_alarm); 361 alarm(options.key_regeneration_time); 362 errno = save_errno; 363 } 364 365 /* 366 * Main program for the daemon. 367 */ 368 int 369 main(int ac, char **av) 370 { 371 extern char *optarg; 372 extern int optind; 373 int opt, sock_in = 0, sock_out = 0, newsock, i, fdsetsz, pid, on = 1; 374 socklen_t fromlen; 375 int connections_per_period_exceeded = 0; 376 int remote_major, remote_minor; 377 int silentrsa = 0; 378 fd_set *fdset; 379 struct sockaddr_storage from; 380 char buf[100]; /* Must not be larger than remote_version. */ 381 char remote_version[100]; /* Must be at least as big as buf. */ 382 const char *remote_ip; 383 int remote_port; 384 char *comment; 385 FILE *f; 386 struct linger linger; 387 struct addrinfo *ai; 388 char ntop[NI_MAXHOST], strport[NI_MAXSERV]; 389 int listen_sock, maxfd; 390 391 /* Save argv[0]. */ 392 saved_argv = av; 393 if (strchr(av[0], '/')) 394 av0 = strrchr(av[0], '/') + 1; 395 else 396 av0 = av[0]; 397 398 /* Initialize configuration options to their default values. */ 399 initialize_server_options(&options); 400 401 /* Parse command-line arguments. */ 402 while ((opt = getopt(ac, av, "f:p:b:k:h:g:V:diqQ46")) != EOF) { 403 switch (opt) { 404 case '4': 405 IPv4or6 = AF_INET; 406 break; 407 case '6': 408 IPv4or6 = AF_INET6; 409 break; 410 case 'f': 411 config_file_name = optarg; 412 break; 413 case 'd': 414 debug_flag = 1; 415 options.log_level = SYSLOG_LEVEL_DEBUG; 416 break; 417 case 'i': 418 inetd_flag = 1; 419 break; 420 case 'Q': 421 silentrsa = 1; 422 break; 423 case 'q': 424 options.log_level = SYSLOG_LEVEL_QUIET; 425 break; 426 case 'b': 427 options.server_key_bits = atoi(optarg); 428 break; 429 case 'p': 430 options.ports_from_cmdline = 1; 431 if (options.num_ports >= MAX_PORTS) 432 fatal("too many ports.\n"); 433 options.ports[options.num_ports++] = atoi(optarg); 434 break; 435 case 'g': 436 options.login_grace_time = atoi(optarg); 437 break; 438 case 'k': 439 options.key_regeneration_time = atoi(optarg); 440 break; 441 case 'h': 442 options.host_key_file = optarg; 443 break; 444 case 'V': 445 client_version_string = optarg; 446 /* only makes sense with inetd_flag, i.e. no listen() */ 447 inetd_flag = 1; 448 break; 449 case '?': 450 default: 451 fprintf(stderr, "sshd version %s\n", SSH_VERSION); 452 fprintf(stderr, "Usage: %s [options]\n", av0); 453 fprintf(stderr, "Options:\n"); 454 fprintf(stderr, " -f file Configuration file (default %s)\n", SERVER_CONFIG_FILE); 455 fprintf(stderr, " -d Debugging mode\n"); 456 fprintf(stderr, " -i Started from inetd\n"); 457 fprintf(stderr, " -q Quiet (no logging)\n"); 458 fprintf(stderr, " -p port Listen on the specified port (default: 22)\n"); 459 fprintf(stderr, " -k seconds Regenerate server key every this many seconds (default: 3600)\n"); 460 fprintf(stderr, " -g seconds Grace period for authentication (default: 300)\n"); 461 fprintf(stderr, " -b bits Size of server RSA key (default: 768 bits)\n"); 462 fprintf(stderr, " -h file File from which to read host key (default: %s)\n", 463 HOST_KEY_FILE); 464 fprintf(stderr, " -4 Use IPv4 only\n"); 465 fprintf(stderr, " -6 Use IPv6 only\n"); 466 exit(1); 467 } 468 } 469 470 /* 471 * Force logging to stderr until we have loaded the private host 472 * key (unless started from inetd) 473 */ 474 log_init(av0, 475 options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level, 476 options.log_facility == -1 ? SYSLOG_FACILITY_AUTH : options.log_facility, 477 !inetd_flag); 478 479 /* check if RSA support exists */ 480 if (rsa_alive() == 0) { 481 if (silentrsa == 0) 482 printf("sshd: no RSA support in libssl and libcrypto -- exiting. See ssl(8)\n"); 483 log("no RSA support in libssl and libcrypto -- exiting. See ssl(8)"); 484 exit(1); 485 } 486 /* Read server configuration options from the configuration file. */ 487 read_server_config(&options, config_file_name); 488 489 /* Fill in default values for those options not explicitly set. */ 490 fill_default_server_options(&options); 491 492 /* Check certain values for sanity. */ 493 if (options.server_key_bits < 512 || 494 options.server_key_bits > 32768) { 495 fprintf(stderr, "Bad server key size.\n"); 496 exit(1); 497 } 498 /* Check that there are no remaining arguments. */ 499 if (optind < ac) { 500 fprintf(stderr, "Extra argument %s.\n", av[optind]); 501 exit(1); 502 } 503 504 debug("sshd version %.100s", SSH_VERSION); 505 506 sensitive_data.host_key = RSA_new(); 507 errno = 0; 508 /* Load the host key. It must have empty passphrase. */ 509 if (!load_private_key(options.host_key_file, "", 510 sensitive_data.host_key, &comment)) { 511 error("Could not load host key: %.200s: %.100s", 512 options.host_key_file, strerror(errno)); 513 exit(1); 514 } 515 xfree(comment); 516 517 /* Initialize the log (it is reinitialized below in case we 518 forked). */ 519 if (debug_flag && !inetd_flag) 520 log_stderr = 1; 521 log_init(av0, options.log_level, options.log_facility, log_stderr); 522 523 /* If not in debugging mode, and not started from inetd, 524 disconnect from the controlling terminal, and fork. The 525 original process exits. */ 526 if (!debug_flag && !inetd_flag) { 527 #ifdef TIOCNOTTY 528 int fd; 529 #endif /* TIOCNOTTY */ 530 if (daemon(0, 0) < 0) 531 fatal("daemon() failed: %.200s", strerror(errno)); 532 533 /* Disconnect from the controlling tty. */ 534 #ifdef TIOCNOTTY 535 fd = open("/dev/tty", O_RDWR | O_NOCTTY); 536 if (fd >= 0) { 537 (void) ioctl(fd, TIOCNOTTY, NULL); 538 close(fd); 539 } 540 #endif /* TIOCNOTTY */ 541 } 542 /* Reinitialize the log (because of the fork above). */ 543 log_init(av0, options.log_level, options.log_facility, log_stderr); 544 545 /* Check that server and host key lengths differ sufficiently. 546 This is necessary to make double encryption work with rsaref. 547 Oh, I hate software patents. I dont know if this can go? Niels */ 548 if (options.server_key_bits > 549 BN_num_bits(sensitive_data.host_key->n) - SSH_KEY_BITS_RESERVED && 550 options.server_key_bits < 551 BN_num_bits(sensitive_data.host_key->n) + SSH_KEY_BITS_RESERVED) { 552 options.server_key_bits = 553 BN_num_bits(sensitive_data.host_key->n) + SSH_KEY_BITS_RESERVED; 554 debug("Forcing server key to %d bits to make it differ from host key.", 555 options.server_key_bits); 556 } 557 /* Do not display messages to stdout in RSA code. */ 558 rsa_set_verbose(0); 559 560 /* Initialize the random number generator. */ 561 arc4random_stir(); 562 563 /* Chdir to the root directory so that the current disk can be 564 unmounted if desired. */ 565 chdir("/"); 566 567 /* Close connection cleanly after attack. */ 568 cipher_attack_detected = packet_disconnect; 569 570 /* Start listening for a socket, unless started from inetd. */ 571 if (inetd_flag) { 572 int s1, s2; 573 s1 = dup(0); /* Make sure descriptors 0, 1, and 2 are in use. */ 574 s2 = dup(s1); 575 sock_in = dup(0); 576 sock_out = dup(1); 577 /* We intentionally do not close the descriptors 0, 1, and 2 578 as our code for setting the descriptors won\'t work 579 if ttyfd happens to be one of those. */ 580 debug("inetd sockets after dupping: %d, %d", sock_in, sock_out); 581 582 public_key = RSA_new(); 583 sensitive_data.private_key = RSA_new(); 584 585 log("Generating %d bit RSA key.", options.server_key_bits); 586 rsa_generate_key(sensitive_data.private_key, public_key, 587 options.server_key_bits); 588 arc4random_stir(); 589 log("RSA key generation complete."); 590 } else { 591 for (ai = options.listen_addrs; ai; ai = ai->ai_next) { 592 if (ai->ai_family != AF_INET && ai->ai_family != AF_INET6) 593 continue; 594 if (num_listen_socks >= MAX_LISTEN_SOCKS) 595 fatal("Too many listen sockets. " 596 "Enlarge MAX_LISTEN_SOCKS"); 597 if (getnameinfo(ai->ai_addr, ai->ai_addrlen, 598 ntop, sizeof(ntop), strport, sizeof(strport), 599 NI_NUMERICHOST|NI_NUMERICSERV) != 0) { 600 error("getnameinfo failed"); 601 continue; 602 } 603 /* Create socket for listening. */ 604 listen_sock = socket(ai->ai_family, SOCK_STREAM, 0); 605 if (listen_sock < 0) { 606 /* kernel may not support ipv6 */ 607 verbose("socket: %.100s", strerror(errno)); 608 continue; 609 } 610 if (fcntl(listen_sock, F_SETFL, O_NONBLOCK) < 0) { 611 error("listen_sock O_NONBLOCK: %s", strerror(errno)); 612 close(listen_sock); 613 continue; 614 } 615 /* 616 * Set socket options. We try to make the port 617 * reusable and have it close as fast as possible 618 * without waiting in unnecessary wait states on 619 * close. 620 */ 621 setsockopt(listen_sock, SOL_SOCKET, SO_REUSEADDR, 622 (void *) &on, sizeof(on)); 623 linger.l_onoff = 1; 624 linger.l_linger = 5; 625 setsockopt(listen_sock, SOL_SOCKET, SO_LINGER, 626 (void *) &linger, sizeof(linger)); 627 628 debug("Bind to port %s on %s.", strport, ntop); 629 630 /* Bind the socket to the desired port. */ 631 if (bind(listen_sock, ai->ai_addr, ai->ai_addrlen) < 0) { 632 error("Bind to port %s on %s failed: %.200s.", 633 strport, ntop, strerror(errno)); 634 close(listen_sock); 635 continue; 636 } 637 listen_socks[num_listen_socks] = listen_sock; 638 num_listen_socks++; 639 640 /* Start listening on the port. */ 641 log("Server listening on %s port %s.", ntop, strport); 642 if (listen(listen_sock, 5) < 0) 643 fatal("listen: %.100s", strerror(errno)); 644 645 } 646 freeaddrinfo(options.listen_addrs); 647 648 if (!num_listen_socks) 649 fatal("Cannot bind any address."); 650 651 if (!debug_flag) { 652 /* 653 * Record our pid in /etc/sshd_pid to make it easier 654 * to kill the correct sshd. We don\'t want to do 655 * this before the bind above because the bind will 656 * fail if there already is a daemon, and this will 657 * overwrite any old pid in the file. 658 */ 659 f = fopen(SSH_DAEMON_PID_FILE, "w"); 660 if (f) { 661 fprintf(f, "%u\n", (unsigned int) getpid()); 662 fclose(f); 663 } 664 } 665 666 public_key = RSA_new(); 667 sensitive_data.private_key = RSA_new(); 668 669 log("Generating %d bit RSA key.", options.server_key_bits); 670 rsa_generate_key(sensitive_data.private_key, public_key, 671 options.server_key_bits); 672 arc4random_stir(); 673 log("RSA key generation complete."); 674 675 /* Schedule server key regeneration alarm. */ 676 signal(SIGALRM, key_regeneration_alarm); 677 alarm(options.key_regeneration_time); 678 679 /* Arrange to restart on SIGHUP. The handler needs listen_sock. */ 680 signal(SIGHUP, sighup_handler); 681 signal(SIGTERM, sigterm_handler); 682 signal(SIGQUIT, sigterm_handler); 683 684 /* Arrange SIGCHLD to be caught. */ 685 signal(SIGCHLD, main_sigchld_handler); 686 687 /* setup fd set for listen */ 688 maxfd = 0; 689 for (i = 0; i < num_listen_socks; i++) 690 if (listen_socks[i] > maxfd) 691 maxfd = listen_socks[i]; 692 fdsetsz = howmany(maxfd, NFDBITS) * sizeof(fd_mask); 693 fdset = (fd_set *)xmalloc(fdsetsz); 694 695 /* Initialize the magic_connections table. It's magical! */ 696 magic_connections = calloc(MAGIC_CONNECTIONS_SIZE, 697 sizeof(struct magic_connection)); 698 if (magic_connections == NULL) 699 fatal("calloc: %s", strerror(errno)); 700 701 /* 702 * Stay listening for connections until the system crashes or 703 * the daemon is killed with a signal. 704 */ 705 for (;;) { 706 if (received_sighup) 707 sighup_restart(); 708 /* Wait in select until there is a connection. */ 709 memset(fdset, 0, fdsetsz); 710 for (i = 0; i < num_listen_socks; i++) 711 FD_SET(listen_socks[i], fdset); 712 if (select(maxfd + 1, fdset, NULL, NULL, NULL) < 0) { 713 if (errno != EINTR) 714 error("select: %.100s", strerror(errno)); 715 continue; 716 } 717 for (i = 0; i < num_listen_socks; i++) { 718 if (!FD_ISSET(listen_socks[i], fdset)) 719 continue; 720 fromlen = sizeof(from); 721 newsock = accept(listen_socks[i], (struct sockaddr *)&from, 722 &fromlen); 723 if (newsock < 0) { 724 if (errno != EINTR && errno != EWOULDBLOCK) 725 error("accept: %.100s", strerror(errno)); 726 continue; 727 } 728 if (fcntl(newsock, F_SETFL, 0) < 0) { 729 error("newsock del O_NONBLOCK: %s", strerror(errno)); 730 continue; 731 } 732 if (options.connections_per_period != 0) { 733 struct timeval diff, connections_end; 734 struct magic_connection *mc; 735 736 (void)gettimeofday(&connections_end, NULL); 737 mc = &magic_connections[magic_hash((struct sockaddr *)0)]; 738 diff = timevaldiff(&mc->connections_begin, &connections_end); 739 if (diff.tv_sec >= options.connections_period) { 740 /* 741 * Slide the window forward only after completely 742 * leaving it. 743 */ 744 mc->connections_begin = connections_end; 745 mc->connections_this_period = 1; 746 } else { 747 if (++mc->connections_this_period > 748 options.connections_per_period) 749 connections_per_period_exceeded = 1; 750 } 751 } 752 753 /* 754 * Got connection. Fork a child to handle it unless 755 * we are in debugging mode or the maximum number of 756 * connections per period has been exceeded. 757 */ 758 if (debug_flag) { 759 /* 760 * In debugging mode. Close the listening 761 * socket, and start processing the 762 * connection without forking. 763 */ 764 debug("Server will not fork when running in debugging mode."); 765 close_listen_socks(); 766 sock_in = newsock; 767 sock_out = newsock; 768 pid = getpid(); 769 break; 770 } else if (connections_per_period_exceeded) { 771 log("Connection rate limit of %u/%us has been exceeded; " 772 "dropping connection from %s.", 773 options.connections_per_period, options.connections_period, 774 ntop); 775 connections_per_period_exceeded = 0; 776 } else { 777 /* 778 * Normal production daemon. Fork, and have 779 * the child process the connection. The 780 * parent continues listening. 781 */ 782 if ((pid = fork()) == 0) { 783 /* 784 * Child. Close the listening socket, and start using the 785 * accepted socket. Reinitialize logging (since our pid has 786 * changed). We break out of the loop to handle the connection. 787 */ 788 close_listen_socks(); 789 sock_in = newsock; 790 sock_out = newsock; 791 log_init(av0, options.log_level, options.log_facility, log_stderr); 792 break; 793 } 794 } 795 796 /* Parent. Stay in the loop. */ 797 if (pid < 0) 798 error("fork: %.100s", strerror(errno)); 799 else 800 debug("Forked child %d.", pid); 801 802 /* Mark that the key has been used (it was "given" to the child). */ 803 key_used = 1; 804 805 arc4random_stir(); 806 807 /* Close the new socket (the child is now taking care of it). */ 808 close(newsock); 809 } /* for (i = 0; i < num_listen_socks; i++) */ 810 /* child process check (or debug mode) */ 811 if (num_listen_socks < 0) 812 break; 813 } 814 } 815 816 /* This is the child processing a new connection. */ 817 818 /* 819 * Disable the key regeneration alarm. We will not regenerate the 820 * key since we are no longer in a position to give it to anyone. We 821 * will not restart on SIGHUP since it no longer makes sense. 822 */ 823 alarm(0); 824 signal(SIGALRM, SIG_DFL); 825 signal(SIGHUP, SIG_DFL); 826 signal(SIGTERM, SIG_DFL); 827 signal(SIGQUIT, SIG_DFL); 828 signal(SIGCHLD, SIG_DFL); 829 830 /* 831 * Set socket options for the connection. We want the socket to 832 * close as fast as possible without waiting for anything. If the 833 * connection is not a socket, these will do nothing. 834 */ 835 /* setsockopt(sock_in, SOL_SOCKET, SO_REUSEADDR, (void *)&on, sizeof(on)); */ 836 linger.l_onoff = 1; 837 linger.l_linger = 5; 838 setsockopt(sock_in, SOL_SOCKET, SO_LINGER, (void *) &linger, sizeof(linger)); 839 840 /* 841 * Register our connection. This turns encryption off because we do 842 * not have a key. 843 */ 844 packet_set_connection(sock_in, sock_out); 845 846 remote_port = get_remote_port(); 847 remote_ip = get_remote_ipaddr(); 848 849 /* Check whether logins are denied from this host. */ 850 #ifdef LIBWRAP 851 /* XXX LIBWRAP noes not know about IPv6 */ 852 { 853 struct request_info req; 854 855 request_init(&req, RQ_DAEMON, av0, RQ_FILE, sock_in, NULL); 856 fromhost(&req); 857 858 if (!hosts_access(&req)) { 859 close(sock_in); 860 close(sock_out); 861 refuse(&req); 862 } 863 /*XXX IPv6 verbose("Connection from %.500s port %d", eval_client(&req), remote_port); */ 864 } 865 #endif /* LIBWRAP */ 866 /* Log the connection. */ 867 verbose("Connection from %.500s port %d", remote_ip, remote_port); 868 869 /* 870 * We don\'t want to listen forever unless the other side 871 * successfully authenticates itself. So we set up an alarm which is 872 * cleared after successful authentication. A limit of zero 873 * indicates no limit. Note that we don\'t set the alarm in debugging 874 * mode; it is just annoying to have the server exit just when you 875 * are about to discover the bug. 876 */ 877 signal(SIGALRM, grace_alarm_handler); 878 if (!debug_flag) 879 alarm(options.login_grace_time); 880 881 if (client_version_string != NULL) { 882 /* we are exec'ed by sshd2, so skip exchange of protocol version */ 883 strlcpy(buf, client_version_string, sizeof(buf)); 884 } else { 885 /* Send our protocol version identification. */ 886 snprintf(buf, sizeof buf, "SSH-%d.%d-%.100s\n", 887 PROTOCOL_MAJOR, PROTOCOL_MINOR, SSH_VERSION); 888 if (atomicio(write, sock_out, buf, strlen(buf)) != strlen(buf)) { 889 log("Could not write ident string to %s.", remote_ip); 890 fatal_cleanup(); 891 } 892 893 /* Read other side\'s version identification. */ 894 for (i = 0; i < sizeof(buf) - 1; i++) { 895 if (read(sock_in, &buf[i], 1) != 1) { 896 log("Did not receive ident string from %s.", remote_ip); 897 fatal_cleanup(); 898 } 899 if (buf[i] == '\r') { 900 buf[i] = '\n'; 901 buf[i + 1] = 0; 902 break; 903 } 904 if (buf[i] == '\n') { 905 /* buf[i] == '\n' */ 906 buf[i + 1] = 0; 907 break; 908 } 909 } 910 buf[sizeof(buf) - 1] = 0; 911 } 912 913 /* 914 * Check that the versions match. In future this might accept 915 * several versions and set appropriate flags to handle them. 916 */ 917 if (sscanf(buf, "SSH-%d.%d-%[^\n]\n", &remote_major, &remote_minor, 918 remote_version) != 3) { 919 char *s = "Protocol mismatch.\n"; 920 921 (void) atomicio(write, sock_out, s, strlen(s)); 922 close(sock_in); 923 close(sock_out); 924 log("Bad protocol version identification '%.100s' from %s", 925 buf, remote_ip); 926 fatal_cleanup(); 927 } 928 debug("Client protocol version %d.%d; client software version %.100s", 929 remote_major, remote_minor, remote_version); 930 if (remote_major != PROTOCOL_MAJOR) { 931 char *s = "Protocol major versions differ.\n"; 932 933 (void) atomicio(write, sock_out, s, strlen(s)); 934 close(sock_in); 935 close(sock_out); 936 log("Protocol major versions differ for %s: %d vs. %d", 937 remote_ip, PROTOCOL_MAJOR, remote_major); 938 fatal_cleanup(); 939 } 940 /* Check that the client has sufficiently high software version. */ 941 if (remote_major == 1 && remote_minor < 3) 942 packet_disconnect("Your ssh version is too old and is no longer supported. Please install a newer version."); 943 944 if (remote_major == 1 && remote_minor == 3) { 945 /* note that this disables agent-forwarding */ 946 enable_compat13(); 947 } 948 /* 949 * Check that the connection comes from a privileged port. Rhosts- 950 * and Rhosts-RSA-Authentication only make sense from priviledged 951 * programs. Of course, if the intruder has root access on his local 952 * machine, he can connect from any port. So do not use these 953 * authentication methods from machines that you do not trust. 954 */ 955 if (remote_port >= IPPORT_RESERVED || 956 remote_port < IPPORT_RESERVED / 2) { 957 options.rhosts_authentication = 0; 958 options.rhosts_rsa_authentication = 0; 959 } 960 #ifdef KRB4 961 if (!packet_connection_is_ipv4() && 962 options.krb4_authentication) { 963 debug("Kerberos Authentication disabled, only available for IPv4."); 964 options.krb4_authentication = 0; 965 } 966 #endif /* KRB4 */ 967 968 packet_set_nonblocking(); 969 970 /* perform the key exchange */ 971 do_ssh_kex(); 972 973 /* authenticate user and start session */ 974 do_authentication(); 975 976 #ifdef KRB4 977 /* Cleanup user's ticket cache file. */ 978 if (options.krb4_ticket_cleanup) 979 (void) dest_tkt(); 980 #endif /* KRB4 */ 981 982 /* Cleanup user's local Xauthority file. */ 983 if (xauthfile) 984 xauthfile_cleanup_proc(NULL); 985 986 /* The connection has been terminated. */ 987 verbose("Closing connection to %.100s", remote_ip); 988 packet_close(); 989 exit(0); 990 } 991 992 /* 993 * SSH1 key exchange 994 */ 995 void 996 do_ssh_kex() 997 { 998 int i, len; 999 int plen, slen; 1000 BIGNUM *session_key_int; 1001 unsigned char session_key[SSH_SESSION_KEY_LENGTH]; 1002 unsigned char cookie[8]; 1003 unsigned int cipher_type, auth_mask, protocol_flags; 1004 u_int32_t rand = 0; 1005 1006 /* 1007 * Generate check bytes that the client must send back in the user 1008 * packet in order for it to be accepted; this is used to defy ip 1009 * spoofing attacks. Note that this only works against somebody 1010 * doing IP spoofing from a remote machine; any machine on the local 1011 * network can still see outgoing packets and catch the random 1012 * cookie. This only affects rhosts authentication, and this is one 1013 * of the reasons why it is inherently insecure. 1014 */ 1015 for (i = 0; i < 8; i++) { 1016 if (i % 4 == 0) 1017 rand = arc4random(); 1018 cookie[i] = rand & 0xff; 1019 rand >>= 8; 1020 } 1021 1022 /* 1023 * Send our public key. We include in the packet 64 bits of random 1024 * data that must be matched in the reply in order to prevent IP 1025 * spoofing. 1026 */ 1027 packet_start(SSH_SMSG_PUBLIC_KEY); 1028 for (i = 0; i < 8; i++) 1029 packet_put_char(cookie[i]); 1030 1031 /* Store our public server RSA key. */ 1032 packet_put_int(BN_num_bits(public_key->n)); 1033 packet_put_bignum(public_key->e); 1034 packet_put_bignum(public_key->n); 1035 1036 /* Store our public host RSA key. */ 1037 packet_put_int(BN_num_bits(sensitive_data.host_key->n)); 1038 packet_put_bignum(sensitive_data.host_key->e); 1039 packet_put_bignum(sensitive_data.host_key->n); 1040 1041 /* Put protocol flags. */ 1042 packet_put_int(SSH_PROTOFLAG_HOST_IN_FWD_OPEN); 1043 1044 /* Declare which ciphers we support. */ 1045 packet_put_int(cipher_mask()); 1046 1047 /* Declare supported authentication types. */ 1048 auth_mask = 0; 1049 if (options.rhosts_authentication) 1050 auth_mask |= 1 << SSH_AUTH_RHOSTS; 1051 if (options.rhosts_rsa_authentication) 1052 auth_mask |= 1 << SSH_AUTH_RHOSTS_RSA; 1053 if (options.rsa_authentication) 1054 auth_mask |= 1 << SSH_AUTH_RSA; 1055 #ifdef KRB4 1056 if (options.krb4_authentication) 1057 auth_mask |= 1 << SSH_AUTH_KRB4; 1058 #endif 1059 #ifdef KRB5 1060 if (options.krb5_authentication) { 1061 auth_mask |= 1 << SSH_AUTH_KRB5; 1062 /* compatibility with MetaCentre ssh */ 1063 auth_mask |= 1 << SSH_AUTH_KRB4; 1064 } 1065 if (options.krb5_tgt_passing) 1066 auth_mask |= 1 << SSH_PASS_KRB5_TGT; 1067 #endif /* KRB5 */ 1068 1069 #ifdef AFS 1070 if (options.krb4_tgt_passing) 1071 auth_mask |= 1 << SSH_PASS_KRB4_TGT; 1072 if (options.afs_token_passing) 1073 auth_mask |= 1 << SSH_PASS_AFS_TOKEN; 1074 #endif 1075 #ifdef SKEY 1076 if (options.skey_authentication == 1) 1077 auth_mask |= 1 << SSH_AUTH_TIS; 1078 #endif 1079 if (options.password_authentication) 1080 auth_mask |= 1 << SSH_AUTH_PASSWORD; 1081 packet_put_int(auth_mask); 1082 1083 /* Send the packet and wait for it to be sent. */ 1084 packet_send(); 1085 packet_write_wait(); 1086 1087 debug("Sent %d bit public key and %d bit host key.", 1088 BN_num_bits(public_key->n), BN_num_bits(sensitive_data.host_key->n)); 1089 1090 /* Read clients reply (cipher type and session key). */ 1091 packet_read_expect(&plen, SSH_CMSG_SESSION_KEY); 1092 1093 /* Get cipher type and check whether we accept this. */ 1094 cipher_type = packet_get_char(); 1095 1096 if (!(cipher_mask() & (1 << cipher_type))) 1097 packet_disconnect("Warning: client selects unsupported cipher."); 1098 1099 /* Get check bytes from the packet. These must match those we 1100 sent earlier with the public key packet. */ 1101 for (i = 0; i < 8; i++) 1102 if (cookie[i] != packet_get_char()) 1103 packet_disconnect("IP Spoofing check bytes do not match."); 1104 1105 debug("Encryption type: %.200s", cipher_name(cipher_type)); 1106 1107 /* Get the encrypted integer. */ 1108 session_key_int = BN_new(); 1109 packet_get_bignum(session_key_int, &slen); 1110 1111 protocol_flags = packet_get_int(); 1112 packet_set_protocol_flags(protocol_flags); 1113 1114 packet_integrity_check(plen, 1 + 8 + slen + 4, SSH_CMSG_SESSION_KEY); 1115 1116 /* 1117 * Decrypt it using our private server key and private host key (key 1118 * with larger modulus first). 1119 */ 1120 if (BN_cmp(sensitive_data.private_key->n, sensitive_data.host_key->n) > 0) { 1121 /* Private key has bigger modulus. */ 1122 if (BN_num_bits(sensitive_data.private_key->n) < 1123 BN_num_bits(sensitive_data.host_key->n) + SSH_KEY_BITS_RESERVED) { 1124 fatal("do_connection: %s: private_key %d < host_key %d + SSH_KEY_BITS_RESERVED %d", 1125 get_remote_ipaddr(), 1126 BN_num_bits(sensitive_data.private_key->n), 1127 BN_num_bits(sensitive_data.host_key->n), 1128 SSH_KEY_BITS_RESERVED); 1129 } 1130 rsa_private_decrypt(session_key_int, session_key_int, 1131 sensitive_data.private_key); 1132 rsa_private_decrypt(session_key_int, session_key_int, 1133 sensitive_data.host_key); 1134 } else { 1135 /* Host key has bigger modulus (or they are equal). */ 1136 if (BN_num_bits(sensitive_data.host_key->n) < 1137 BN_num_bits(sensitive_data.private_key->n) + SSH_KEY_BITS_RESERVED) { 1138 fatal("do_connection: %s: host_key %d < private_key %d + SSH_KEY_BITS_RESERVED %d", 1139 get_remote_ipaddr(), 1140 BN_num_bits(sensitive_data.host_key->n), 1141 BN_num_bits(sensitive_data.private_key->n), 1142 SSH_KEY_BITS_RESERVED); 1143 } 1144 rsa_private_decrypt(session_key_int, session_key_int, 1145 sensitive_data.host_key); 1146 rsa_private_decrypt(session_key_int, session_key_int, 1147 sensitive_data.private_key); 1148 } 1149 1150 compute_session_id(session_id, cookie, 1151 sensitive_data.host_key->n, 1152 sensitive_data.private_key->n); 1153 1154 /* Destroy the private and public keys. They will no longer be needed. */ 1155 RSA_free(public_key); 1156 RSA_free(sensitive_data.private_key); 1157 RSA_free(sensitive_data.host_key); 1158 1159 /* 1160 * Extract session key from the decrypted integer. The key is in the 1161 * least significant 256 bits of the integer; the first byte of the 1162 * key is in the highest bits. 1163 */ 1164 BN_mask_bits(session_key_int, sizeof(session_key) * 8); 1165 len = BN_num_bytes(session_key_int); 1166 if (len < 0 || len > sizeof(session_key)) 1167 fatal("do_connection: bad len from %s: session_key_int %d > sizeof(session_key) %d", 1168 get_remote_ipaddr(), 1169 len, sizeof(session_key)); 1170 memset(session_key, 0, sizeof(session_key)); 1171 BN_bn2bin(session_key_int, session_key + sizeof(session_key) - len); 1172 1173 /* Destroy the decrypted integer. It is no longer needed. */ 1174 BN_clear_free(session_key_int); 1175 1176 /* Xor the first 16 bytes of the session key with the session id. */ 1177 for (i = 0; i < 16; i++) 1178 session_key[i] ^= session_id[i]; 1179 1180 /* Set the session key. From this on all communications will be encrypted. */ 1181 packet_set_encryption_key(session_key, SSH_SESSION_KEY_LENGTH, cipher_type); 1182 1183 /* Destroy our copy of the session key. It is no longer needed. */ 1184 memset(session_key, 0, sizeof(session_key)); 1185 1186 debug("Received session key; encryption turned on."); 1187 1188 /* Send an acknowledgement packet. Note that this packet is sent encrypted. */ 1189 packet_start(SSH_SMSG_SUCCESS); 1190 packet_send(); 1191 packet_write_wait(); 1192 } 1193 1194 1195 /* 1196 * Check if the user is allowed to log in via ssh. If user is listed in 1197 * DenyUsers or user's primary group is listed in DenyGroups, false will 1198 * be returned. If AllowUsers isn't empty and user isn't listed there, or 1199 * if AllowGroups isn't empty and user isn't listed there, false will be 1200 * returned. 1201 * If the user's shell is not executable, false will be returned. 1202 * Otherwise true is returned. 1203 */ 1204 static int 1205 allowed_user(struct passwd * pw) 1206 { 1207 struct stat st; 1208 struct group *grp; 1209 int i; 1210 1211 /* Shouldn't be called if pw is NULL, but better safe than sorry... */ 1212 if (!pw) 1213 return 0; 1214 1215 /* deny if shell does not exists or is not executable */ 1216 if (stat(pw->pw_shell, &st) != 0) 1217 return 0; 1218 if (!((st.st_mode & S_IFREG) && (st.st_mode & (S_IXOTH|S_IXUSR|S_IXGRP)))) 1219 return 0; 1220 1221 /* Return false if user is listed in DenyUsers */ 1222 if (options.num_deny_users > 0) { 1223 if (!pw->pw_name) 1224 return 0; 1225 for (i = 0; i < options.num_deny_users; i++) 1226 if (match_pattern(pw->pw_name, options.deny_users[i])) 1227 return 0; 1228 } 1229 /* Return false if AllowUsers isn't empty and user isn't listed there */ 1230 if (options.num_allow_users > 0) { 1231 if (!pw->pw_name) 1232 return 0; 1233 for (i = 0; i < options.num_allow_users; i++) 1234 if (match_pattern(pw->pw_name, options.allow_users[i])) 1235 break; 1236 /* i < options.num_allow_users iff we break for loop */ 1237 if (i >= options.num_allow_users) 1238 return 0; 1239 } 1240 /* Get the primary group name if we need it. Return false if it fails */ 1241 if (options.num_deny_groups > 0 || options.num_allow_groups > 0) { 1242 grp = getgrgid(pw->pw_gid); 1243 if (!grp) 1244 return 0; 1245 1246 /* Return false if user's group is listed in DenyGroups */ 1247 if (options.num_deny_groups > 0) { 1248 if (!grp->gr_name) 1249 return 0; 1250 for (i = 0; i < options.num_deny_groups; i++) 1251 if (match_pattern(grp->gr_name, options.deny_groups[i])) 1252 return 0; 1253 } 1254 /* 1255 * Return false if AllowGroups isn't empty and user's group 1256 * isn't listed there 1257 */ 1258 if (options.num_allow_groups > 0) { 1259 if (!grp->gr_name) 1260 return 0; 1261 for (i = 0; i < options.num_allow_groups; i++) 1262 if (match_pattern(grp->gr_name, options.allow_groups[i])) 1263 break; 1264 /* i < options.num_allow_groups iff we break for 1265 loop */ 1266 if (i >= options.num_allow_groups) 1267 return 0; 1268 } 1269 } 1270 #ifndef __FreeBSD__ /* FreeBSD handle it later */ 1271 /* Fail if the account's expiration time has passed. */ 1272 if (pw->pw_expire != 0) { 1273 struct timeval tv; 1274 1275 (void)gettimeofday(&tv, NULL); 1276 if (tv.tv_sec >= pw->pw_expire) 1277 return 0; 1278 } 1279 #endif /* !__FreeBSD__ */ 1280 /* We found no reason not to let this user try to log on... */ 1281 return 1; 1282 } 1283 1284 /* 1285 * Performs authentication of an incoming connection. Session key has already 1286 * been exchanged and encryption is enabled. 1287 */ 1288 void 1289 do_authentication() 1290 { 1291 struct passwd *pw, pwcopy; 1292 int plen, ulen; 1293 char *user; 1294 #ifdef LOGIN_CAP 1295 login_cap_t *lc; 1296 char *hosts; 1297 const char *from_host, *from_ip; 1298 int denied; 1299 #endif /* LOGIN_CAP */ 1300 1301 /* Get the name of the user that we wish to log in as. */ 1302 packet_read_expect(&plen, SSH_CMSG_USER); 1303 1304 /* Get the user name. */ 1305 user = packet_get_string(&ulen); 1306 packet_integrity_check(plen, (4 + ulen), SSH_CMSG_USER); 1307 1308 setproctitle("%s", user); 1309 1310 #ifdef AFS 1311 /* If machine has AFS, set process authentication group. */ 1312 if (k_hasafs()) { 1313 k_setpag(); 1314 k_unlog(); 1315 } 1316 #endif /* AFS */ 1317 1318 /* Verify that the user is a valid user. */ 1319 pw = getpwnam(user); 1320 if (!pw || !allowed_user(pw)) 1321 do_fake_authloop(user); 1322 xfree(user); 1323 1324 /* Take a copy of the returned structure. */ 1325 memset(&pwcopy, 0, sizeof(pwcopy)); 1326 pwcopy.pw_name = xstrdup(pw->pw_name); 1327 pwcopy.pw_passwd = xstrdup(pw->pw_passwd); 1328 pwcopy.pw_uid = pw->pw_uid; 1329 pwcopy.pw_gid = pw->pw_gid; 1330 pwcopy.pw_dir = xstrdup(pw->pw_dir); 1331 pwcopy.pw_shell = xstrdup(pw->pw_shell); 1332 pwcopy.pw_class = xstrdup(pw->pw_class); 1333 pwcopy.pw_expire = pw->pw_expire; 1334 pwcopy.pw_change = pw->pw_change; 1335 pw = &pwcopy; 1336 1337 /* 1338 * If we are not running as root, the user must have the same uid as 1339 * the server. 1340 */ 1341 if (getuid() != 0 && pw->pw_uid != getuid()) 1342 packet_disconnect("Cannot change user when server not running as root."); 1343 1344 debug("Attempting authentication for %.100s.", pw->pw_name); 1345 1346 /* If the user has no password, accept authentication immediately. */ 1347 if (options.password_authentication && 1348 #ifdef KRB5 1349 !options.krb5_authentication && 1350 #endif /* KRB5 */ 1351 #ifdef KRB4 1352 (!options.krb4_authentication || options.krb4_or_local_passwd) && 1353 #endif /* KRB4 */ 1354 auth_password(pw, "")) { 1355 /* Authentication with empty password succeeded. */ 1356 log("Login for user %s from %.100s, accepted without authentication.", 1357 pw->pw_name, get_remote_ipaddr()); 1358 } else { 1359 /* Loop until the user has been authenticated or the 1360 connection is closed, do_authloop() returns only if 1361 authentication is successfull */ 1362 do_authloop(pw); 1363 } 1364 1365 /* Check if the user is logging in as root and root logins are disallowed. */ 1366 if (pw->pw_uid == 0 && !options.permit_root_login) { 1367 if (forced_command) 1368 log("Root login accepted for forced command."); 1369 else 1370 packet_disconnect("ROOT LOGIN REFUSED FROM %.200s", 1371 get_canonical_hostname()); 1372 } 1373 1374 #ifdef LOGIN_CAP 1375 lc = login_getpwclass(pw); 1376 if (lc == NULL) 1377 lc = login_getclassbyname(NULL, pw); 1378 from_host = get_canonical_hostname(); 1379 from_ip = get_remote_ipaddr(); 1380 1381 denied = 0; 1382 if ((hosts = login_getcapstr(lc, "host.deny", NULL, NULL)) != NULL) { 1383 denied = match_hostname(from_host, hosts, strlen(hosts)); 1384 if (!denied) 1385 denied = match_hostname(from_ip, hosts, strlen(hosts)); 1386 } 1387 if (!denied && 1388 (hosts = login_getcapstr(lc, "host.allow", NULL, NULL)) != NULL) { 1389 denied = !match_hostname(from_host, hosts, strlen(hosts)); 1390 if (denied) 1391 denied = !match_hostname(from_ip, hosts, strlen(hosts)); 1392 } 1393 login_close(lc); 1394 if (denied) { 1395 log("Denied connection for %.200s from %.200s [%.200s].", 1396 pw->pw_name, from_host, from_ip); 1397 packet_disconnect("Sorry, you are not allowed to connect."); 1398 } 1399 #endif /* LOGIN_CAP */ 1400 1401 if (pw->pw_uid == 0) 1402 log("ROOT LOGIN as '%.100s' from %.100s", 1403 pw->pw_name, get_canonical_hostname()); 1404 1405 /* The user has been authenticated and accepted. */ 1406 packet_start(SSH_SMSG_SUCCESS); 1407 packet_send(); 1408 packet_write_wait(); 1409 1410 /* Perform session preparation. */ 1411 do_authenticated(pw); 1412 } 1413 1414 #define AUTH_FAIL_MAX 6 1415 #define AUTH_FAIL_LOG (AUTH_FAIL_MAX/2) 1416 #define AUTH_FAIL_MSG "Too many authentication failures for %.100s" 1417 1418 /* 1419 * read packets and try to authenticate local user *pw. 1420 * return if authentication is successfull 1421 */ 1422 void 1423 do_authloop(struct passwd * pw) 1424 { 1425 int attempt = 0; 1426 unsigned int bits; 1427 BIGNUM *client_host_key_e, *client_host_key_n; 1428 BIGNUM *n; 1429 char *client_user, *password; 1430 char user[1024]; 1431 int plen, dlen, nlen, ulen, elen; 1432 int type = 0; 1433 void (*authlog) (const char *fmt,...) = verbose; 1434 #ifdef HAVE_LIBPAM 1435 int pam_retval; 1436 #endif /* HAVE_LIBPAM */ 1437 #if 0 1438 #ifdef KRB5 1439 { 1440 krb5_error_code ret; 1441 1442 ret = krb5_init_context(&ssh_context); 1443 if (ret) 1444 verbose("Error while initializing Kerberos V5."); 1445 krb5_init_ets(ssh_context); 1446 1447 } 1448 #endif /* KRB5 */ 1449 #endif 1450 1451 /* Indicate that authentication is needed. */ 1452 packet_start(SSH_SMSG_FAILURE); 1453 packet_send(); 1454 packet_write_wait(); 1455 1456 for (attempt = 1;; attempt++) { 1457 int authenticated = 0; 1458 strlcpy(user, "", sizeof user); 1459 1460 /* Get a packet from the client. */ 1461 type = packet_read(&plen); 1462 1463 /* Process the packet. */ 1464 switch (type) { 1465 #ifdef AFS 1466 case SSH_CMSG_HAVE_KRB4_TGT: 1467 if (!options.krb4_tgt_passing) { 1468 /* packet_get_all(); */ 1469 verbose("Kerberos v4 tgt passing disabled."); 1470 break; 1471 } else { 1472 /* Accept Kerberos v4 tgt. */ 1473 char *tgt = packet_get_string(&dlen); 1474 packet_integrity_check(plen, 4 + dlen, type); 1475 if (!auth_krb4_tgt(pw, tgt)) 1476 verbose("Kerberos v4 tgt REFUSED for %s", pw->pw_name); 1477 xfree(tgt); 1478 } 1479 continue; 1480 1481 case SSH_CMSG_HAVE_AFS_TOKEN: 1482 if (!options.afs_token_passing || !k_hasafs()) { 1483 /* packet_get_all(); */ 1484 verbose("AFS token passing disabled."); 1485 break; 1486 } else { 1487 /* Accept AFS token. */ 1488 char *token_string = packet_get_string(&dlen); 1489 packet_integrity_check(plen, 4 + dlen, type); 1490 if (!auth_afs_token(pw, token_string)) 1491 verbose("AFS token REFUSED for %s", pw->pw_name); 1492 xfree(token_string); 1493 } 1494 continue; 1495 #endif /* AFS */ 1496 #ifdef KRB4 1497 case SSH_CMSG_AUTH_KRB4: 1498 if (!options.krb4_authentication) { 1499 /* packet_get_all(); */ 1500 verbose("Kerberos v4 authentication disabled."); 1501 break; 1502 } else { 1503 /* Try Kerberos v4 authentication. */ 1504 KTEXT_ST auth; 1505 char *tkt_user = NULL; 1506 char *kdata = packet_get_string((unsigned int *) &auth.length); 1507 packet_integrity_check(plen, 4 + auth.length, type); 1508 1509 if (auth.length < MAX_KTXT_LEN) 1510 memcpy(auth.dat, kdata, auth.length); 1511 xfree(kdata); 1512 1513 authenticated = auth_krb4(pw->pw_name, &auth, &tkt_user); 1514 1515 if (authenticated) { 1516 snprintf(user, sizeof user, " tktuser %s", tkt_user); 1517 xfree(tkt_user); 1518 } 1519 } 1520 break; 1521 #endif /* KRB4 */ 1522 #ifdef KRB5 1523 case SSH_CMSG_AUTH_KRB5: 1524 if (!options.krb5_authentication) { 1525 verbose("Kerberos v5 authentication disabled."); 1526 break; 1527 } else { 1528 krb5_data k5data; 1529 #if 0 1530 if (krb5_init_context(&ssh_context)) { 1531 verbose("Error while initializing Kerberos V5."); 1532 break; 1533 } 1534 krb5_init_ets(ssh_context); 1535 #endif 1536 1537 k5data.data = packet_get_string(&k5data.length); 1538 packet_integrity_check(plen, 4 + k5data.length, type); 1539 if (auth_krb5(pw->pw_name, &k5data, &tkt_client)) { 1540 /* pw->name is passed just for logging purposes 1541 * */ 1542 /* authorize client against .k5login */ 1543 if (krb5_kuserok(ssh_context, 1544 tkt_client, 1545 pw->pw_name)) 1546 authenticated = 1; 1547 } 1548 xfree(k5data.data); 1549 } 1550 break; 1551 #endif /* KRB5 */ 1552 1553 case SSH_CMSG_AUTH_RHOSTS: 1554 if (!options.rhosts_authentication) { 1555 verbose("Rhosts authentication disabled."); 1556 break; 1557 } 1558 /* 1559 * Get client user name. Note that we just have to 1560 * trust the client; this is one reason why rhosts 1561 * authentication is insecure. (Another is 1562 * IP-spoofing on a local network.) 1563 */ 1564 client_user = packet_get_string(&ulen); 1565 packet_integrity_check(plen, 4 + ulen, type); 1566 1567 /* Try to authenticate using /etc/hosts.equiv and 1568 .rhosts. */ 1569 authenticated = auth_rhosts(pw, client_user); 1570 1571 snprintf(user, sizeof user, " ruser %s", client_user); 1572 xfree(client_user); 1573 break; 1574 1575 case SSH_CMSG_AUTH_RHOSTS_RSA: 1576 if (!options.rhosts_rsa_authentication) { 1577 verbose("Rhosts with RSA authentication disabled."); 1578 break; 1579 } 1580 /* 1581 * Get client user name. Note that we just have to 1582 * trust the client; root on the client machine can 1583 * claim to be any user. 1584 */ 1585 client_user = packet_get_string(&ulen); 1586 1587 /* Get the client host key. */ 1588 client_host_key_e = BN_new(); 1589 client_host_key_n = BN_new(); 1590 bits = packet_get_int(); 1591 packet_get_bignum(client_host_key_e, &elen); 1592 packet_get_bignum(client_host_key_n, &nlen); 1593 1594 if (bits != BN_num_bits(client_host_key_n)) 1595 error("Warning: keysize mismatch for client_host_key: " 1596 "actual %d, announced %d", BN_num_bits(client_host_key_n), bits); 1597 packet_integrity_check(plen, (4 + ulen) + 4 + elen + nlen, type); 1598 1599 authenticated = auth_rhosts_rsa(pw, client_user, 1600 client_host_key_e, client_host_key_n); 1601 BN_clear_free(client_host_key_e); 1602 BN_clear_free(client_host_key_n); 1603 1604 snprintf(user, sizeof user, " ruser %s", client_user); 1605 xfree(client_user); 1606 break; 1607 1608 case SSH_CMSG_AUTH_RSA: 1609 if (!options.rsa_authentication) { 1610 verbose("RSA authentication disabled."); 1611 break; 1612 } 1613 /* RSA authentication requested. */ 1614 n = BN_new(); 1615 packet_get_bignum(n, &nlen); 1616 packet_integrity_check(plen, nlen, type); 1617 authenticated = auth_rsa(pw, n); 1618 BN_clear_free(n); 1619 break; 1620 1621 case SSH_CMSG_AUTH_PASSWORD: 1622 if (!options.password_authentication) { 1623 verbose("Password authentication disabled."); 1624 break; 1625 } 1626 /* 1627 * Read user password. It is in plain text, but was 1628 * transmitted over the encrypted channel so it is 1629 * not visible to an outside observer. 1630 */ 1631 password = packet_get_string(&dlen); 1632 packet_integrity_check(plen, 4 + dlen, type); 1633 1634 /* Try authentication with the password. */ 1635 authenticated = auth_password(pw, password); 1636 1637 memset(password, 0, strlen(password)); 1638 xfree(password); 1639 break; 1640 1641 #ifdef SKEY 1642 case SSH_CMSG_AUTH_TIS: 1643 debug("rcvd SSH_CMSG_AUTH_TIS"); 1644 if (options.skey_authentication == 1) { 1645 char *skeyinfo = skey_keyinfo(pw->pw_name); 1646 if (skeyinfo == NULL) { 1647 debug("generating fake skeyinfo for %.100s.", pw->pw_name); 1648 skeyinfo = skey_fake_keyinfo(pw->pw_name); 1649 } 1650 if (skeyinfo != NULL) { 1651 /* we send our s/key- in tis-challenge messages */ 1652 debug("sending challenge '%s'", skeyinfo); 1653 packet_start(SSH_SMSG_AUTH_TIS_CHALLENGE); 1654 packet_put_string(skeyinfo, strlen(skeyinfo)); 1655 packet_send(); 1656 packet_write_wait(); 1657 continue; 1658 } 1659 } 1660 break; 1661 case SSH_CMSG_AUTH_TIS_RESPONSE: 1662 debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE"); 1663 if (options.skey_authentication == 1) { 1664 char *response = packet_get_string(&dlen); 1665 debug("skey response == '%s'", response); 1666 packet_integrity_check(plen, 4 + dlen, type); 1667 authenticated = (skey_haskey(pw->pw_name) == 0 && 1668 skey_passcheck(pw->pw_name, response) != -1); 1669 xfree(response); 1670 } 1671 break; 1672 #else 1673 case SSH_CMSG_AUTH_TIS: 1674 /* TIS Authentication is unsupported */ 1675 log("TIS authentication unsupported."); 1676 break; 1677 #endif 1678 1679 default: 1680 /* 1681 * Any unknown messages will be ignored (and failure 1682 * returned) during authentication. 1683 */ 1684 log("Unknown message during authentication: type %d", type); 1685 break; 1686 } 1687 1688 /* Raise logging level */ 1689 if (authenticated || 1690 attempt == AUTH_FAIL_LOG || 1691 type == SSH_CMSG_AUTH_PASSWORD) 1692 authlog = log; 1693 1694 authlog("%s %s for %.200s from %.200s port %d%s", 1695 authenticated ? "Accepted" : "Failed", 1696 get_authname(type), 1697 pw->pw_uid == 0 ? "ROOT" : pw->pw_name, 1698 get_remote_ipaddr(), 1699 get_remote_port(), 1700 user); 1701 1702 if (authenticated) 1703 return; 1704 1705 if (attempt > AUTH_FAIL_MAX) 1706 packet_disconnect(AUTH_FAIL_MSG, pw->pw_name); 1707 1708 /* Send a message indicating that the authentication attempt failed. */ 1709 packet_start(SSH_SMSG_FAILURE); 1710 packet_send(); 1711 packet_write_wait(); 1712 } 1713 } 1714 1715 /* 1716 * The user does not exist or access is denied, 1717 * but fake indication that authentication is needed. 1718 */ 1719 void 1720 do_fake_authloop(char *user) 1721 { 1722 int attempt = 0; 1723 1724 log("Faking authloop for illegal user %.200s from %.200s port %d", 1725 user, 1726 get_remote_ipaddr(), 1727 get_remote_port()); 1728 1729 /* Indicate that authentication is needed. */ 1730 packet_start(SSH_SMSG_FAILURE); 1731 packet_send(); 1732 packet_write_wait(); 1733 1734 /* 1735 * Keep reading packets, and always respond with a failure. This is 1736 * to avoid disclosing whether such a user really exists. 1737 */ 1738 for (attempt = 1;; attempt++) { 1739 /* Read a packet. This will not return if the client disconnects. */ 1740 int plen; 1741 int type = packet_read(&plen); 1742 #ifdef SKEY 1743 int dlen; 1744 char *password, *skeyinfo; 1745 /* Try to send a fake s/key challenge. */ 1746 if (options.skey_authentication == 1 && 1747 (skeyinfo = skey_fake_keyinfo(user)) != NULL) { 1748 password = NULL; 1749 if (type == SSH_CMSG_AUTH_TIS) { 1750 packet_start(SSH_SMSG_AUTH_TIS_CHALLENGE); 1751 packet_put_string(skeyinfo, strlen(skeyinfo)); 1752 packet_send(); 1753 packet_write_wait(); 1754 continue; 1755 } else if (type == SSH_CMSG_AUTH_PASSWORD && 1756 options.password_authentication && 1757 (password = packet_get_string(&dlen)) != NULL && 1758 dlen == 5 && 1759 strncasecmp(password, "s/key", 5) == 0 ) { 1760 packet_send_debug(skeyinfo); 1761 } 1762 if (password != NULL) 1763 xfree(password); 1764 } 1765 #endif 1766 if (attempt > AUTH_FAIL_MAX) 1767 packet_disconnect(AUTH_FAIL_MSG, user); 1768 1769 /* 1770 * Send failure. This should be indistinguishable from a 1771 * failed authentication. 1772 */ 1773 packet_start(SSH_SMSG_FAILURE); 1774 packet_send(); 1775 packet_write_wait(); 1776 } 1777 /* NOTREACHED */ 1778 abort(); 1779 } 1780 1781 struct pty_cleanup_context { 1782 const char *ttyname; 1783 int pid; 1784 }; 1785 1786 /* 1787 * Function to perform cleanup if we get aborted abnormally (e.g., due to a 1788 * dropped connection). 1789 */ 1790 void 1791 pty_cleanup_proc(void *context) 1792 { 1793 struct pty_cleanup_context *cu = context; 1794 1795 debug("pty_cleanup_proc called"); 1796 1797 /* Record that the user has logged out. */ 1798 record_logout(cu->pid, cu->ttyname); 1799 1800 /* Release the pseudo-tty. */ 1801 pty_release(cu->ttyname); 1802 } 1803 1804 /* simple cleanup: chown tty slave back to root */ 1805 static void 1806 pty_release_proc(void *tty) 1807 { 1808 char *ttyname = tty; 1809 pty_release(ttyname); 1810 } 1811 1812 /* 1813 * Prepares for an interactive session. This is called after the user has 1814 * been successfully authenticated. During this message exchange, pseudo 1815 * terminals are allocated, X11, TCP/IP, and authentication agent forwardings 1816 * are requested, etc. 1817 */ 1818 void 1819 do_authenticated(struct passwd * pw) 1820 { 1821 int type; 1822 int compression_level = 0, enable_compression_after_reply = 0; 1823 int have_pty = 0, ptyfd = -1, ttyfd = -1; 1824 int row, col, xpixel, ypixel, screen; 1825 char ttyname[64]; 1826 char *command, *term = NULL, *display = NULL, *proto = NULL, *data = NULL; 1827 int n_bytes; 1828 1829 /* 1830 * Cancel the alarm we set to limit the time taken for 1831 * authentication. 1832 */ 1833 alarm(0); 1834 1835 /* 1836 * Inform the channel mechanism that we are the server side and that 1837 * the client may request to connect to any port at all. (The user 1838 * could do it anyway, and we wouldn\'t know what is permitted except 1839 * by the client telling us, so we can equally well trust the client 1840 * not to request anything bogus.) 1841 */ 1842 if (!no_port_forwarding_flag) 1843 channel_permit_all_opens(); 1844 1845 /* 1846 * We stay in this loop until the client requests to execute a shell 1847 * or a command. 1848 */ 1849 while (1) { 1850 int plen, dlen; 1851 1852 /* Get a packet from the client. */ 1853 type = packet_read(&plen); 1854 1855 /* Process the packet. */ 1856 switch (type) { 1857 case SSH_CMSG_REQUEST_COMPRESSION: 1858 packet_integrity_check(plen, 4, type); 1859 compression_level = packet_get_int(); 1860 if (compression_level < 1 || compression_level > 9) { 1861 packet_send_debug("Received illegal compression level %d.", 1862 compression_level); 1863 goto fail; 1864 } 1865 /* Enable compression after we have responded with SUCCESS. */ 1866 enable_compression_after_reply = 1; 1867 break; 1868 1869 case SSH_CMSG_REQUEST_PTY: 1870 if (no_pty_flag) { 1871 debug("Allocating a pty not permitted for this authentication."); 1872 goto fail; 1873 } 1874 if (have_pty) 1875 packet_disconnect("Protocol error: you already have a pty."); 1876 1877 debug("Allocating pty."); 1878 1879 /* Allocate a pty and open it. */ 1880 if (!pty_allocate(&ptyfd, &ttyfd, ttyname, 1881 sizeof(ttyname))) { 1882 error("Failed to allocate pty."); 1883 goto fail; 1884 } 1885 fatal_add_cleanup(pty_release_proc, (void *)ttyname); 1886 pty_setowner(pw, ttyname); 1887 1888 /* Get TERM from the packet. Note that the value may be of arbitrary length. */ 1889 term = packet_get_string(&dlen); 1890 packet_integrity_check(dlen, strlen(term), type); 1891 1892 /* Remaining bytes */ 1893 n_bytes = plen - (4 + dlen + 4 * 4); 1894 1895 if (strcmp(term, "") == 0) { 1896 xfree(term); 1897 term = NULL; 1898 } 1899 1900 /* Get window size from the packet. */ 1901 row = packet_get_int(); 1902 col = packet_get_int(); 1903 xpixel = packet_get_int(); 1904 ypixel = packet_get_int(); 1905 pty_change_window_size(ptyfd, row, col, xpixel, ypixel); 1906 1907 /* Get tty modes from the packet. */ 1908 tty_parse_modes(ttyfd, &n_bytes); 1909 packet_integrity_check(plen, 4 + dlen + 4 * 4 + n_bytes, type); 1910 1911 /* Indicate that we now have a pty. */ 1912 have_pty = 1; 1913 break; 1914 1915 case SSH_CMSG_X11_REQUEST_FORWARDING: 1916 if (!options.x11_forwarding) { 1917 packet_send_debug("X11 forwarding disabled in server configuration file."); 1918 goto fail; 1919 } 1920 #ifdef XAUTH_PATH 1921 if (no_x11_forwarding_flag) { 1922 packet_send_debug("X11 forwarding not permitted for this authentication."); 1923 goto fail; 1924 } 1925 debug("Received request for X11 forwarding with auth spoofing."); 1926 if (display) 1927 packet_disconnect("Protocol error: X11 display already set."); 1928 { 1929 int proto_len, data_len; 1930 proto = packet_get_string(&proto_len); 1931 data = packet_get_string(&data_len); 1932 packet_integrity_check(plen, 4 + proto_len + 4 + data_len + 4, type); 1933 } 1934 if (packet_get_protocol_flags() & SSH_PROTOFLAG_SCREEN_NUMBER) 1935 screen = packet_get_int(); 1936 else 1937 screen = 0; 1938 display = x11_create_display_inet(screen, options.x11_display_offset); 1939 if (!display) 1940 goto fail; 1941 1942 /* Setup to always have a local .Xauthority. */ 1943 xauthfile = xmalloc(MAXPATHLEN); 1944 strlcpy(xauthfile, "/tmp/ssh-XXXXXXXX", MAXPATHLEN); 1945 temporarily_use_uid(pw->pw_uid); 1946 if (mkdtemp(xauthfile) == NULL) { 1947 restore_uid(); 1948 error("private X11 dir: mkdtemp %s failed: %s", 1949 xauthfile, strerror(errno)); 1950 xfree(xauthfile); 1951 xauthfile = NULL; 1952 goto fail; 1953 } 1954 restore_uid(); 1955 strlcat(xauthfile, "/cookies", MAXPATHLEN); 1956 fatal_add_cleanup(xauthfile_cleanup_proc, NULL); 1957 break; 1958 #else /* XAUTH_PATH */ 1959 packet_send_debug("No xauth program; cannot forward with spoofing."); 1960 goto fail; 1961 #endif /* XAUTH_PATH */ 1962 1963 case SSH_CMSG_AGENT_REQUEST_FORWARDING: 1964 if (no_agent_forwarding_flag || compat13) { 1965 debug("Authentication agent forwarding not permitted for this authentication."); 1966 goto fail; 1967 } 1968 debug("Received authentication agent forwarding request."); 1969 auth_input_request_forwarding(pw); 1970 break; 1971 1972 case SSH_CMSG_PORT_FORWARD_REQUEST: 1973 if (no_port_forwarding_flag) { 1974 debug("Port forwarding not permitted for this authentication."); 1975 goto fail; 1976 } 1977 debug("Received TCP/IP port forwarding request."); 1978 channel_input_port_forward_request(pw->pw_uid == 0); 1979 break; 1980 1981 case SSH_CMSG_MAX_PACKET_SIZE: 1982 if (packet_set_maxsize(packet_get_int()) < 0) 1983 goto fail; 1984 break; 1985 1986 case SSH_CMSG_EXEC_SHELL: 1987 /* Set interactive/non-interactive mode. */ 1988 packet_set_interactive(have_pty || display != NULL, 1989 options.keepalives); 1990 1991 if (forced_command != NULL) 1992 goto do_forced_command; 1993 debug("Forking shell."); 1994 packet_integrity_check(plen, 0, type); 1995 if (have_pty) 1996 do_exec_pty(NULL, ptyfd, ttyfd, ttyname, pw, term, display, proto, data); 1997 else 1998 do_exec_no_pty(NULL, pw, display, proto, data); 1999 return; 2000 2001 case SSH_CMSG_EXEC_CMD: 2002 /* Set interactive/non-interactive mode. */ 2003 packet_set_interactive(have_pty || display != NULL, 2004 options.keepalives); 2005 2006 if (forced_command != NULL) 2007 goto do_forced_command; 2008 /* Get command from the packet. */ 2009 { 2010 int dlen; 2011 command = packet_get_string(&dlen); 2012 debug("Executing command '%.500s'", command); 2013 packet_integrity_check(plen, 4 + dlen, type); 2014 } 2015 if (have_pty) 2016 do_exec_pty(command, ptyfd, ttyfd, ttyname, pw, term, display, proto, data); 2017 else 2018 do_exec_no_pty(command, pw, display, proto, data); 2019 xfree(command); 2020 return; 2021 #ifdef KRB5 2022 case SSH_CMSG_HAVE_KRB5_TGT: 2023 /* Passing krb5 ticket */ 2024 if (!options.krb5_tgt_passing 2025 /*|| !options.krb5_authentication */) { 2026 2027 } 2028 2029 if (tkt_client == NULL) { 2030 /* passing tgt without krb5 authentication */ 2031 } 2032 2033 { 2034 krb5_data tgt; 2035 tgt.data = packet_get_string(&tgt.length); 2036 2037 if (!auth_krb5_tgt(pw->pw_name, &tgt, tkt_client)) { 2038 verbose ("Kerberos V5 TGT refused for %.100s", pw->pw_name); 2039 xfree(tgt.data); 2040 goto fail; 2041 } 2042 xfree(tgt.data); 2043 2044 break; 2045 } 2046 #endif /* KRB5 */ 2047 2048 default: 2049 /* 2050 * Any unknown messages in this phase are ignored, 2051 * and a failure message is returned. 2052 */ 2053 log("Unknown packet type received after authentication: %d", type); 2054 goto fail; 2055 } 2056 2057 /* The request was successfully processed. */ 2058 packet_start(SSH_SMSG_SUCCESS); 2059 packet_send(); 2060 packet_write_wait(); 2061 2062 /* Enable compression now that we have replied if appropriate. */ 2063 if (enable_compression_after_reply) { 2064 enable_compression_after_reply = 0; 2065 packet_start_compression(compression_level); 2066 } 2067 continue; 2068 2069 fail: 2070 /* The request failed. */ 2071 packet_start(SSH_SMSG_FAILURE); 2072 packet_send(); 2073 packet_write_wait(); 2074 continue; 2075 2076 do_forced_command: 2077 /* 2078 * There is a forced command specified for this login. 2079 * Execute it. 2080 */ 2081 debug("Executing forced command: %.900s", forced_command); 2082 if (have_pty) 2083 do_exec_pty(forced_command, ptyfd, ttyfd, ttyname, pw, term, display, proto, data); 2084 else 2085 do_exec_no_pty(forced_command, pw, display, proto, data); 2086 return; 2087 } 2088 } 2089 2090 /* 2091 * This is called to fork and execute a command when we have no tty. This 2092 * will call do_child from the child, and server_loop from the parent after 2093 * setting up file descriptors and such. 2094 */ 2095 void 2096 do_exec_no_pty(const char *command, struct passwd * pw, 2097 const char *display, const char *auth_proto, 2098 const char *auth_data) 2099 { 2100 int pid; 2101 2102 #ifdef USE_PIPES 2103 int pin[2], pout[2], perr[2]; 2104 /* Allocate pipes for communicating with the program. */ 2105 if (pipe(pin) < 0 || pipe(pout) < 0 || pipe(perr) < 0) 2106 packet_disconnect("Could not create pipes: %.100s", 2107 strerror(errno)); 2108 #else /* USE_PIPES */ 2109 int inout[2], err[2]; 2110 /* Uses socket pairs to communicate with the program. */ 2111 if (socketpair(AF_UNIX, SOCK_STREAM, 0, inout) < 0 || 2112 socketpair(AF_UNIX, SOCK_STREAM, 0, err) < 0) 2113 packet_disconnect("Could not create socket pairs: %.100s", 2114 strerror(errno)); 2115 #endif /* USE_PIPES */ 2116 2117 setproctitle("%s@notty", pw->pw_name); 2118 2119 /* Fork the child. */ 2120 if ((pid = fork()) == 0) { 2121 /* Child. Reinitialize the log since the pid has changed. */ 2122 log_init(av0, options.log_level, options.log_facility, log_stderr); 2123 2124 /* 2125 * Create a new session and process group since the 4.4BSD 2126 * setlogin() affects the entire process group. 2127 */ 2128 if (setsid() < 0) 2129 error("setsid failed: %.100s", strerror(errno)); 2130 2131 #ifdef USE_PIPES 2132 /* 2133 * Redirect stdin. We close the parent side of the socket 2134 * pair, and make the child side the standard input. 2135 */ 2136 close(pin[1]); 2137 if (dup2(pin[0], 0) < 0) 2138 perror("dup2 stdin"); 2139 close(pin[0]); 2140 2141 /* Redirect stdout. */ 2142 close(pout[0]); 2143 if (dup2(pout[1], 1) < 0) 2144 perror("dup2 stdout"); 2145 close(pout[1]); 2146 2147 /* Redirect stderr. */ 2148 close(perr[0]); 2149 if (dup2(perr[1], 2) < 0) 2150 perror("dup2 stderr"); 2151 close(perr[1]); 2152 #else /* USE_PIPES */ 2153 /* 2154 * Redirect stdin, stdout, and stderr. Stdin and stdout will 2155 * use the same socket, as some programs (particularly rdist) 2156 * seem to depend on it. 2157 */ 2158 close(inout[1]); 2159 close(err[1]); 2160 if (dup2(inout[0], 0) < 0) /* stdin */ 2161 perror("dup2 stdin"); 2162 if (dup2(inout[0], 1) < 0) /* stdout. Note: same socket as stdin. */ 2163 perror("dup2 stdout"); 2164 if (dup2(err[0], 2) < 0) /* stderr */ 2165 perror("dup2 stderr"); 2166 #endif /* USE_PIPES */ 2167 2168 /* Do processing for the child (exec command etc). */ 2169 do_child(command, pw, NULL, display, auth_proto, auth_data, NULL); 2170 /* NOTREACHED */ 2171 } 2172 if (pid < 0) 2173 packet_disconnect("fork failed: %.100s", strerror(errno)); 2174 #ifdef USE_PIPES 2175 /* We are the parent. Close the child sides of the pipes. */ 2176 close(pin[0]); 2177 close(pout[1]); 2178 close(perr[1]); 2179 2180 /* Enter the interactive session. */ 2181 server_loop(pid, pin[1], pout[0], perr[0]); 2182 /* server_loop has closed pin[1], pout[1], and perr[1]. */ 2183 #else /* USE_PIPES */ 2184 /* We are the parent. Close the child sides of the socket pairs. */ 2185 close(inout[0]); 2186 close(err[0]); 2187 2188 /* 2189 * Enter the interactive session. Note: server_loop must be able to 2190 * handle the case that fdin and fdout are the same. 2191 */ 2192 server_loop(pid, inout[1], inout[1], err[1]); 2193 /* server_loop has closed inout[1] and err[1]. */ 2194 #endif /* USE_PIPES */ 2195 } 2196 2197 /* 2198 * This is called to fork and execute a command when we have a tty. This 2199 * will call do_child from the child, and server_loop from the parent after 2200 * setting up file descriptors, controlling tty, updating wtmp, utmp, 2201 * lastlog, and other such operations. 2202 */ 2203 void 2204 do_exec_pty(const char *command, int ptyfd, int ttyfd, 2205 const char *ttyname, struct passwd * pw, const char *term, 2206 const char *display, const char *auth_proto, 2207 const char *auth_data) 2208 { 2209 int pid, fdout; 2210 int ptymaster; 2211 const char *hostname; 2212 time_t last_login_time; 2213 char buf[100], *time_string; 2214 FILE *f; 2215 char line[256]; 2216 struct stat st; 2217 int quiet_login; 2218 struct sockaddr_storage from; 2219 socklen_t fromlen; 2220 struct pty_cleanup_context cleanup_context; 2221 #ifdef LOGIN_CAP 2222 login_cap_t *lc; 2223 char *fname; 2224 #endif /* LOGIN_CAP */ 2225 #ifdef __FreeBSD__ 2226 #define DEFAULT_WARN (2L * 7L * 86400L) /* Two weeks */ 2227 struct timeval tv; 2228 time_t warntime = DEFAULT_WARN; 2229 #endif /* __FreeBSD__ */ 2230 2231 /* Get remote host name. */ 2232 hostname = get_canonical_hostname(); 2233 2234 /* 2235 * Get the time when the user last logged in. Buf will be set to 2236 * contain the hostname the last login was from. 2237 */ 2238 if (!options.use_login) { 2239 last_login_time = get_last_login_time(pw->pw_uid, pw->pw_name, 2240 buf, sizeof(buf)); 2241 } 2242 setproctitle("%s@%s", pw->pw_name, strrchr(ttyname, '/') + 1); 2243 2244 /* Fork the child. */ 2245 if ((pid = fork()) == 0) { 2246 pid = getpid(); 2247 2248 /* Child. Reinitialize the log because the pid has 2249 changed. */ 2250 log_init(av0, options.log_level, options.log_facility, log_stderr); 2251 2252 /* Close the master side of the pseudo tty. */ 2253 close(ptyfd); 2254 2255 /* Make the pseudo tty our controlling tty. */ 2256 pty_make_controlling_tty(&ttyfd, ttyname); 2257 2258 /* Redirect stdin from the pseudo tty. */ 2259 if (dup2(ttyfd, fileno(stdin)) < 0) 2260 error("dup2 stdin failed: %.100s", strerror(errno)); 2261 2262 /* Redirect stdout to the pseudo tty. */ 2263 if (dup2(ttyfd, fileno(stdout)) < 0) 2264 error("dup2 stdin failed: %.100s", strerror(errno)); 2265 2266 /* Redirect stderr to the pseudo tty. */ 2267 if (dup2(ttyfd, fileno(stderr)) < 0) 2268 error("dup2 stdin failed: %.100s", strerror(errno)); 2269 2270 /* Close the extra descriptor for the pseudo tty. */ 2271 close(ttyfd); 2272 2273 /* 2274 * Get IP address of client. This is needed because we want 2275 * to record where the user logged in from. If the 2276 * connection is not a socket, let the ip address be 0.0.0.0. 2277 */ 2278 memset(&from, 0, sizeof(from)); 2279 if (packet_get_connection_in() == packet_get_connection_out()) { 2280 fromlen = sizeof(from); 2281 if (getpeername(packet_get_connection_in(), 2282 (struct sockaddr *) & from, &fromlen) < 0) { 2283 debug("getpeername: %.100s", strerror(errno)); 2284 fatal_cleanup(); 2285 } 2286 } 2287 /* Record that there was a login on that terminal. */ 2288 record_login(pid, ttyname, pw->pw_name, pw->pw_uid, hostname, 2289 (struct sockaddr *)&from); 2290 2291 /* Check if .hushlogin exists. */ 2292 snprintf(line, sizeof line, "%.200s/.hushlogin", pw->pw_dir); 2293 quiet_login = stat(line, &st) >= 0; 2294 #ifdef LOGIN_CAP 2295 lc = login_getpwclass(pw); 2296 if (lc == NULL) 2297 lc = login_getclassbyname(NULL, pw); 2298 quiet_login = login_getcapbool(lc, "hushlogin", quiet_login); 2299 #endif /* LOGIN_CAP */ 2300 2301 #ifdef __FreeBSD__ 2302 if (pw->pw_change || pw->pw_expire) 2303 (void)gettimeofday(&tv, NULL); 2304 #ifdef LOGIN_CAP 2305 warntime = login_getcaptime(lc, "warnpassword", 2306 DEFAULT_WARN, DEFAULT_WARN); 2307 #endif /* LOGIN_CAP */ 2308 /* 2309 * If the password change time is set and has passed, give the 2310 * user a password expiry notice and chance to change it. 2311 */ 2312 if (pw->pw_change != 0) { 2313 if (tv.tv_sec >= pw->pw_change) { 2314 (void)printf( 2315 "Sorry -- your password has expired.\n"); 2316 log("%s Password expired - forcing change", 2317 pw->pw_name); 2318 command = _PATH_CHPASS; 2319 } else if (pw->pw_change - tv.tv_sec < warntime && 2320 !quiet_login) 2321 (void)printf( 2322 "Warning: your password expires on %s", 2323 ctime(&pw->pw_change)); 2324 } 2325 #ifdef LOGIN_CAP 2326 warntime = login_getcaptime(lc, "warnexpire", 2327 DEFAULT_WARN, DEFAULT_WARN); 2328 #endif /* LOGIN_CAP */ 2329 if (pw->pw_expire) { 2330 if (tv.tv_sec >= pw->pw_expire) { 2331 (void)printf( 2332 "Sorry -- your account has expired.\n"); 2333 log( 2334 "LOGIN %.200s REFUSED (EXPIRED) FROM %.200s ON TTY %.200s", 2335 pw->pw_name, hostname, ttyname); 2336 exit(254); 2337 } else if (pw->pw_expire - tv.tv_sec < warntime && 2338 !quiet_login) 2339 (void)printf( 2340 "Warning: your account expires on %s", 2341 ctime(&pw->pw_expire)); 2342 } 2343 #endif /* __FreeBSD__ */ 2344 2345 /* 2346 * If the user has logged in before, display the time of last 2347 * login. However, don't display anything extra if a command 2348 * has been specified (so that ssh can be used to execute 2349 * commands on a remote machine without users knowing they 2350 * are going to another machine). Login(1) will do this for 2351 * us as well, so check if login(1) is used 2352 */ 2353 if (command == NULL && last_login_time != 0 && !quiet_login && 2354 !options.use_login) { 2355 /* Convert the date to a string. */ 2356 time_string = ctime(&last_login_time); 2357 /* Remove the trailing newline. */ 2358 if (strchr(time_string, '\n')) 2359 *strchr(time_string, '\n') = 0; 2360 /* Display the last login time. Host if displayed 2361 if known. */ 2362 if (strcmp(buf, "") == 0) 2363 printf("Last login: %s\r\n", time_string); 2364 else 2365 printf("Last login: %s from %s\r\n", time_string, buf); 2366 } 2367 #ifdef LOGIN_CAP 2368 if (command == NULL && !quiet_login && !options.use_login) { 2369 fname = login_getcapstr(lc, "copyright", NULL, NULL); 2370 if (fname != NULL && (f = fopen(fname, "r")) != NULL) { 2371 while (fgets(line, sizeof(line), f) != NULL) 2372 fputs(line, stdout); 2373 fclose(f); 2374 } else 2375 (void)printf("%s\n\t%s %s\n", 2376 "Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994", 2377 "The Regents of the University of California. ", 2378 "All rights reserved."); 2379 } 2380 #endif /* LOGIN_CAP */ 2381 /* 2382 * Print /etc/motd unless a command was specified or printing 2383 * it was disabled in server options or login(1) will be 2384 * used. Note that some machines appear to print it in 2385 * /etc/profile or similar. 2386 */ 2387 if (command == NULL && options.print_motd && !quiet_login && 2388 !options.use_login) { 2389 #ifdef LOGIN_CAP 2390 fname = login_getcapstr(lc, "welcome", NULL, NULL); 2391 if (fname == NULL || (f = fopen(fname, "r")) == NULL) 2392 f = fopen("/etc/motd", "r"); 2393 #else /* !LOGIN_CAP */ 2394 f = fopen("/etc/motd", "r"); 2395 #endif /* LOGIN_CAP */ 2396 /* Print /etc/motd if it exists. */ 2397 if (f) { 2398 while (fgets(line, sizeof(line), f)) 2399 fputs(line, stdout); 2400 fclose(f); 2401 } 2402 } 2403 #ifdef LOGIN_CAP 2404 login_close(lc); 2405 #endif /* LOGIN_CAP */ 2406 2407 /* Do common processing for the child, such as execing the command. */ 2408 do_child(command, pw, term, display, auth_proto, auth_data, ttyname); 2409 /* NOTREACHED */ 2410 } 2411 if (pid < 0) 2412 packet_disconnect("fork failed: %.100s", strerror(errno)); 2413 /* Parent. Close the slave side of the pseudo tty. */ 2414 close(ttyfd); 2415 2416 /* 2417 * Add a cleanup function to clear the utmp entry and record logout 2418 * time in case we call fatal() (e.g., the connection gets closed). 2419 */ 2420 cleanup_context.pid = pid; 2421 cleanup_context.ttyname = ttyname; 2422 fatal_add_cleanup(pty_cleanup_proc, (void *) &cleanup_context); 2423 fatal_remove_cleanup(pty_release_proc, (void *) ttyname); 2424 2425 /* 2426 * Create another descriptor of the pty master side for use as the 2427 * standard input. We could use the original descriptor, but this 2428 * simplifies code in server_loop. The descriptor is bidirectional. 2429 */ 2430 fdout = dup(ptyfd); 2431 if (fdout < 0) 2432 packet_disconnect("dup #1 failed: %.100s", strerror(errno)); 2433 2434 /* we keep a reference to the pty master */ 2435 ptymaster = dup(ptyfd); 2436 if (ptymaster < 0) 2437 packet_disconnect("dup #2 failed: %.100s", strerror(errno)); 2438 2439 /* Enter interactive session. */ 2440 server_loop(pid, ptyfd, fdout, -1); 2441 /* server_loop _has_ closed ptyfd and fdout. */ 2442 2443 /* Cancel the cleanup function. */ 2444 fatal_remove_cleanup(pty_cleanup_proc, (void *) &cleanup_context); 2445 2446 /* Record that the user has logged out. */ 2447 record_logout(pid, ttyname); 2448 2449 /* Release the pseudo-tty. */ 2450 pty_release(ttyname); 2451 2452 /* 2453 * Close the server side of the socket pairs. We must do this after 2454 * the pty cleanup, so that another process doesn't get this pty 2455 * while we're still cleaning up. 2456 */ 2457 if (close(ptymaster) < 0) 2458 error("close(ptymaster): %s", strerror(errno)); 2459 } 2460 2461 /* 2462 * Sets the value of the given variable in the environment. If the variable 2463 * already exists, its value is overriden. 2464 */ 2465 void 2466 child_set_env(char ***envp, unsigned int *envsizep, const char *name, 2467 const char *value) 2468 { 2469 unsigned int i, namelen; 2470 char **env; 2471 2472 /* 2473 * Find the slot where the value should be stored. If the variable 2474 * already exists, we reuse the slot; otherwise we append a new slot 2475 * at the end of the array, expanding if necessary. 2476 */ 2477 env = *envp; 2478 namelen = strlen(name); 2479 for (i = 0; env[i]; i++) 2480 if (strncmp(env[i], name, namelen) == 0 && env[i][namelen] == '=') 2481 break; 2482 if (env[i]) { 2483 /* Reuse the slot. */ 2484 xfree(env[i]); 2485 } else { 2486 /* New variable. Expand if necessary. */ 2487 if (i >= (*envsizep) - 1) { 2488 (*envsizep) += 50; 2489 env = (*envp) = xrealloc(env, (*envsizep) * sizeof(char *)); 2490 } 2491 /* Need to set the NULL pointer at end of array beyond the new slot. */ 2492 env[i + 1] = NULL; 2493 } 2494 2495 /* Allocate space and format the variable in the appropriate slot. */ 2496 env[i] = xmalloc(strlen(name) + 1 + strlen(value) + 1); 2497 snprintf(env[i], strlen(name) + 1 + strlen(value) + 1, "%s=%s", name, value); 2498 } 2499 2500 /* 2501 * Reads environment variables from the given file and adds/overrides them 2502 * into the environment. If the file does not exist, this does nothing. 2503 * Otherwise, it must consist of empty lines, comments (line starts with '#') 2504 * and assignments of the form name=value. No other forms are allowed. 2505 */ 2506 void 2507 read_environment_file(char ***env, unsigned int *envsize, 2508 const char *filename) 2509 { 2510 FILE *f; 2511 char buf[4096]; 2512 char *cp, *value; 2513 2514 f = fopen(filename, "r"); 2515 if (!f) 2516 return; 2517 2518 while (fgets(buf, sizeof(buf), f)) { 2519 for (cp = buf; *cp == ' ' || *cp == '\t'; cp++) 2520 ; 2521 if (!*cp || *cp == '#' || *cp == '\n') 2522 continue; 2523 if (strchr(cp, '\n')) 2524 *strchr(cp, '\n') = '\0'; 2525 value = strchr(cp, '='); 2526 if (value == NULL) { 2527 fprintf(stderr, "Bad line in %.100s: %.200s\n", filename, buf); 2528 continue; 2529 } 2530 /* Replace the equals sign by nul, and advance value to the value string. */ 2531 *value = '\0'; 2532 value++; 2533 child_set_env(env, envsize, cp, value); 2534 } 2535 fclose(f); 2536 } 2537 2538 /* 2539 * Performs common processing for the child, such as setting up the 2540 * environment, closing extra file descriptors, setting the user and group 2541 * ids, and executing the command or shell. 2542 */ 2543 void 2544 do_child(const char *command, struct passwd * pw, const char *term, 2545 const char *display, const char *auth_proto, 2546 const char *auth_data, const char *ttyname) 2547 { 2548 char *shell; 2549 const char *cp = NULL; 2550 char buf[256]; 2551 FILE *f; 2552 unsigned int envsize, i; 2553 char **env = NULL; 2554 extern char **environ; 2555 struct stat st; 2556 char *argv[10]; 2557 #ifdef LOGIN_CAP 2558 login_cap_t *lc; 2559 2560 lc = login_getpwclass(pw); 2561 if (lc == NULL) 2562 lc = login_getclassbyname(NULL, pw); 2563 if (pw->pw_uid != 0) 2564 auth_checknologin(lc); 2565 #else /* !LOGIN_CAP */ 2566 f = fopen("/etc/nologin", "r"); 2567 if (f) { 2568 /* /etc/nologin exists. Print its contents and exit. */ 2569 while (fgets(buf, sizeof(buf), f)) 2570 fputs(buf, stderr); 2571 fclose(f); 2572 if (pw->pw_uid != 0) 2573 exit(254); 2574 2575 } 2576 #endif /* LOGIN_CAP */ 2577 2578 #ifdef LOGIN_CAP 2579 if (options.use_login) 2580 #endif /* LOGIN_CAP */ 2581 /* Set login name in the kernel. */ 2582 if (setlogin(pw->pw_name) < 0) 2583 error("setlogin failed: %s", strerror(errno)); 2584 2585 /* Set uid, gid, and groups. */ 2586 /* Login(1) does this as well, and it needs uid 0 for the "-h" 2587 switch, so we let login(1) to this for us. */ 2588 if (!options.use_login) { 2589 #ifdef LOGIN_CAP 2590 char **tmpenv; 2591 2592 /* Initialize temp environment */ 2593 envsize = 64; 2594 env = xmalloc(envsize * sizeof(char *)); 2595 env[0] = NULL; 2596 2597 child_set_env(&env, &envsize, "PATH", 2598 (pw->pw_uid == 0) ? 2599 _PATH_STDPATH : _PATH_DEFPATH); 2600 2601 snprintf(buf, sizeof buf, "%.200s/%.50s", 2602 _PATH_MAILDIR, pw->pw_name); 2603 child_set_env(&env, &envsize, "MAIL", buf); 2604 2605 if (getenv("TZ")) 2606 child_set_env(&env, &envsize, "TZ", getenv("TZ")); 2607 2608 /* Save parent environment */ 2609 tmpenv = environ; 2610 environ = env; 2611 2612 if (setusercontext(lc, pw, pw->pw_uid, LOGIN_SETALL) < 0) 2613 fatal("setusercontext failed: %s", strerror(errno)); 2614 2615 /* Restore parent environment */ 2616 env = environ; 2617 environ = tmpenv; 2618 2619 for (envsize = 0; env[envsize] != NULL; ++envsize) 2620 ; 2621 envsize = (envsize < 100) ? 100 : envsize + 16; 2622 env = xrealloc(env, envsize * sizeof(char *)); 2623 2624 #else /* !LOGIN_CAP */ 2625 2626 if (getuid() == 0 || geteuid() == 0) { 2627 if (setgid(pw->pw_gid) < 0) { 2628 perror("setgid"); 2629 exit(1); 2630 } 2631 /* Initialize the group list. */ 2632 if (initgroups(pw->pw_name, pw->pw_gid) < 0) { 2633 perror("initgroups"); 2634 exit(1); 2635 } 2636 endgrent(); 2637 2638 /* Permanently switch to the desired uid. */ 2639 permanently_set_uid(pw->pw_uid); 2640 } 2641 if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid) 2642 fatal("Failed to set uids to %d.", (int) pw->pw_uid); 2643 #endif /* LOGIN_CAP */ 2644 } 2645 /* 2646 * Get the shell from the password data. An empty shell field is 2647 * legal, and means /bin/sh. 2648 */ 2649 shell = (pw->pw_shell[0] == '\0') ? _PATH_BSHELL : pw->pw_shell; 2650 #ifdef LOGIN_CAP 2651 shell = login_getcapstr(lc, "shell", shell, shell); 2652 #endif /* LOGIN_CAP */ 2653 2654 #ifdef AFS 2655 /* Try to get AFS tokens for the local cell. */ 2656 if (k_hasafs()) { 2657 char cell[64]; 2658 2659 if (k_afs_cell_of_file(pw->pw_dir, cell, sizeof(cell)) == 0) 2660 krb_afslog(cell, 0); 2661 2662 krb_afslog(0, 0); 2663 } 2664 #endif /* AFS */ 2665 2666 /* Initialize the environment. */ 2667 if (env == NULL) { 2668 envsize = 100; 2669 env = xmalloc(envsize * sizeof(char *)); 2670 env[0] = NULL; 2671 } 2672 2673 if (!options.use_login) { 2674 /* Set basic environment. */ 2675 child_set_env(&env, &envsize, "USER", pw->pw_name); 2676 child_set_env(&env, &envsize, "LOGNAME", pw->pw_name); 2677 child_set_env(&env, &envsize, "HOME", pw->pw_dir); 2678 #ifndef LOGIN_CAP 2679 child_set_env(&env, &envsize, "PATH", _PATH_STDPATH); 2680 2681 snprintf(buf, sizeof buf, "%.200s/%.50s", 2682 _PATH_MAILDIR, pw->pw_name); 2683 child_set_env(&env, &envsize, "MAIL", buf); 2684 #endif /* !LOGIN_CAP */ 2685 2686 /* Normal systems set SHELL by default. */ 2687 child_set_env(&env, &envsize, "SHELL", shell); 2688 } 2689 #ifdef LOGIN_CAP 2690 if (options.use_login) 2691 #endif /* LOGIN_CAP */ 2692 if (getenv("TZ")) 2693 child_set_env(&env, &envsize, "TZ", getenv("TZ")); 2694 2695 /* Set custom environment options from RSA authentication. */ 2696 while (custom_environment) { 2697 struct envstring *ce = custom_environment; 2698 char *s = ce->s; 2699 int i; 2700 for (i = 0; s[i] != '=' && s[i]; i++); 2701 if (s[i] == '=') { 2702 s[i] = 0; 2703 child_set_env(&env, &envsize, s, s + i + 1); 2704 } 2705 custom_environment = ce->next; 2706 xfree(ce->s); 2707 xfree(ce); 2708 } 2709 2710 snprintf(buf, sizeof buf, "%.50s %d %d", 2711 get_remote_ipaddr(), get_remote_port(), get_local_port()); 2712 child_set_env(&env, &envsize, "SSH_CLIENT", buf); 2713 2714 if (ttyname) 2715 child_set_env(&env, &envsize, "SSH_TTY", ttyname); 2716 if (term) 2717 child_set_env(&env, &envsize, "TERM", term); 2718 if (display) 2719 child_set_env(&env, &envsize, "DISPLAY", display); 2720 2721 #ifdef KRB4 2722 { 2723 extern char *ticket; 2724 2725 if (ticket) 2726 child_set_env(&env, &envsize, "KRBTKFILE", ticket); 2727 } 2728 #endif /* KRB4 */ 2729 2730 #ifdef KRB5 2731 { 2732 extern krb5_ccache mem_ccache; 2733 2734 if (mem_ccache) { 2735 krb5_error_code problem; 2736 krb5_ccache ccache; 2737 #ifdef AFS 2738 if (k_hasafs()) 2739 krb5_afslog(ssh_context, mem_ccache, NULL, NULL); 2740 #endif /* AFS */ 2741 2742 problem = krb5_cc_default(ssh_context, &ccache); 2743 if (problem) {} 2744 else { 2745 problem = krb5_cc_copy_cache(ssh_context, mem_ccache, ccache); 2746 if (problem) {} 2747 } 2748 2749 krb5_cc_close(ssh_context, ccache); 2750 } 2751 2752 krb5_cleanup_proc(NULL); 2753 } 2754 #endif /* KRB5 */ 2755 2756 if (xauthfile) 2757 child_set_env(&env, &envsize, "XAUTHORITY", xauthfile); 2758 if (auth_get_socket_name() != NULL) 2759 child_set_env(&env, &envsize, SSH_AUTHSOCKET_ENV_NAME, 2760 auth_get_socket_name()); 2761 2762 /* read $HOME/.ssh/environment. */ 2763 if (!options.use_login) { 2764 snprintf(buf, sizeof buf, "%.200s/.ssh/environment", pw->pw_dir); 2765 read_environment_file(&env, &envsize, buf); 2766 } 2767 if (debug_flag) { 2768 /* dump the environment */ 2769 fprintf(stderr, "Environment:\n"); 2770 for (i = 0; env[i]; i++) 2771 fprintf(stderr, " %.200s\n", env[i]); 2772 } 2773 /* 2774 * Close the connection descriptors; note that this is the child, and 2775 * the server will still have the socket open, and it is important 2776 * that we do not shutdown it. Note that the descriptors cannot be 2777 * closed before building the environment, as we call 2778 * get_remote_ipaddr there. 2779 */ 2780 if (packet_get_connection_in() == packet_get_connection_out()) 2781 close(packet_get_connection_in()); 2782 else { 2783 close(packet_get_connection_in()); 2784 close(packet_get_connection_out()); 2785 } 2786 /* 2787 * Close all descriptors related to channels. They will still remain 2788 * open in the parent. 2789 */ 2790 /* XXX better use close-on-exec? -markus */ 2791 channel_close_all(); 2792 2793 /* 2794 * Close any extra file descriptors. Note that there may still be 2795 * descriptors left by system functions. They will be closed later. 2796 */ 2797 endpwent(); 2798 2799 /* 2800 * Close any extra open file descriptors so that we don\'t have them 2801 * hanging around in clients. Note that we want to do this after 2802 * initgroups, because at least on Solaris 2.3 it leaves file 2803 * descriptors open. 2804 */ 2805 for (i = 3; i < getdtablesize(); i++) 2806 close(i); 2807 2808 /* Change current directory to the user\'s home directory. */ 2809 if ( 2810 #ifdef __FreeBSD__ 2811 !*pw->pw_dir || 2812 #endif /* __FreeBSD__ */ 2813 chdir(pw->pw_dir) < 0 2814 ) { 2815 #ifdef __FreeBSD__ 2816 int quiet_login = 0; 2817 #endif /* __FreeBSD__ */ 2818 #ifdef LOGIN_CAP 2819 if (login_getcapbool(lc, "requirehome", 0)) { 2820 (void)printf("Home directory not available\n"); 2821 log("LOGIN %.200s REFUSED (HOMEDIR) ON TTY %.200s", 2822 pw->pw_name, ttyname); 2823 exit(254); 2824 } 2825 #endif /* LOGIN_CAP */ 2826 #ifdef __FreeBSD__ 2827 if (chdir("/") < 0) { 2828 (void)printf("Cannot find root directory\n"); 2829 log("LOGIN %.200s REFUSED (ROOTDIR) ON TTY %.200s", 2830 pw->pw_name, ttyname); 2831 exit(254); 2832 } 2833 #ifdef LOGIN_CAP 2834 quiet_login = login_getcapbool(lc, "hushlogin", 0); 2835 #endif /* LOGIN_CAP */ 2836 if (!quiet_login || *pw->pw_dir) 2837 (void)printf( 2838 "No home directory.\nLogging in with home = \"/\".\n"); 2839 2840 #else /* !__FreeBSD__ */ 2841 2842 fprintf(stderr, "Could not chdir to home directory %s: %s\n", 2843 pw->pw_dir, strerror(errno)); 2844 #endif /* __FreeBSD__ */ 2845 } 2846 #ifdef LOGIN_CAP 2847 login_close(lc); 2848 #endif /* LOGIN_CAP */ 2849 2850 /* 2851 * Must take new environment into use so that .ssh/rc, /etc/sshrc and 2852 * xauth are run in the proper environment. 2853 */ 2854 environ = env; 2855 2856 /* 2857 * Run $HOME/.ssh/rc, /etc/sshrc, or xauth (whichever is found first 2858 * in this order). 2859 */ 2860 if (!options.use_login) { 2861 if (stat(SSH_USER_RC, &st) >= 0) { 2862 if (debug_flag) 2863 fprintf(stderr, "Running /bin/sh %s\n", SSH_USER_RC); 2864 2865 f = popen("/bin/sh " SSH_USER_RC, "w"); 2866 if (f) { 2867 if (auth_proto != NULL && auth_data != NULL) 2868 fprintf(f, "%s %s\n", auth_proto, auth_data); 2869 pclose(f); 2870 } else 2871 fprintf(stderr, "Could not run %s\n", SSH_USER_RC); 2872 } else if (stat(SSH_SYSTEM_RC, &st) >= 0) { 2873 if (debug_flag) 2874 fprintf(stderr, "Running /bin/sh %s\n", SSH_SYSTEM_RC); 2875 2876 f = popen("/bin/sh " SSH_SYSTEM_RC, "w"); 2877 if (f) { 2878 if (auth_proto != NULL && auth_data != NULL) 2879 fprintf(f, "%s %s\n", auth_proto, auth_data); 2880 pclose(f); 2881 } else 2882 fprintf(stderr, "Could not run %s\n", SSH_SYSTEM_RC); 2883 } 2884 #ifdef XAUTH_PATH 2885 else { 2886 /* Add authority data to .Xauthority if appropriate. */ 2887 if (auth_proto != NULL && auth_data != NULL) { 2888 if (debug_flag) 2889 fprintf(stderr, "Running %.100s add %.100s %.100s %.100s\n", 2890 XAUTH_PATH, display, auth_proto, auth_data); 2891 2892 f = popen(XAUTH_PATH " -q -", "w"); 2893 if (f) { 2894 fprintf(f, "add %s %s %s\n", display, auth_proto, auth_data); 2895 fclose(f); 2896 } else 2897 fprintf(stderr, "Could not run %s -q -\n", XAUTH_PATH); 2898 } 2899 } 2900 #endif /* XAUTH_PATH */ 2901 2902 /* Get the last component of the shell name. */ 2903 cp = strrchr(shell, '/'); 2904 if (cp) 2905 cp++; 2906 else 2907 cp = shell; 2908 } 2909 /* 2910 * If we have no command, execute the shell. In this case, the shell 2911 * name to be passed in argv[0] is preceded by '-' to indicate that 2912 * this is a login shell. 2913 */ 2914 if (!command) { 2915 if (!options.use_login) { 2916 char buf[256]; 2917 2918 /* 2919 * Check for mail if we have a tty and it was enabled 2920 * in server options. 2921 */ 2922 if (ttyname && options.check_mail) { 2923 char *mailbox; 2924 struct stat mailstat; 2925 mailbox = getenv("MAIL"); 2926 if (mailbox != NULL) { 2927 if (stat(mailbox, &mailstat) != 0 || mailstat.st_size == 0) 2928 #ifdef __FreeBSD__ 2929 ; 2930 #else /* !__FreeBSD__ */ 2931 printf("No mail.\n"); 2932 #endif /* __FreeBSD__ */ 2933 else if (mailstat.st_mtime < mailstat.st_atime) 2934 printf("You have mail.\n"); 2935 else 2936 printf("You have new mail.\n"); 2937 } 2938 } 2939 /* Start the shell. Set initial character to '-'. */ 2940 buf[0] = '-'; 2941 strncpy(buf + 1, cp, sizeof(buf) - 1); 2942 buf[sizeof(buf) - 1] = 0; 2943 2944 /* Execute the shell. */ 2945 argv[0] = buf; 2946 argv[1] = NULL; 2947 execve(shell, argv, env); 2948 2949 /* Executing the shell failed. */ 2950 perror(shell); 2951 exit(1); 2952 2953 } else { 2954 /* Launch login(1). */ 2955 2956 execl("/usr/bin/login", "login", "-h", get_remote_ipaddr(), 2957 "-p", "-f", "--", pw->pw_name, NULL); 2958 2959 /* Login couldn't be executed, die. */ 2960 2961 perror("login"); 2962 exit(1); 2963 } 2964 } 2965 /* 2966 * Execute the command using the user's shell. This uses the -c 2967 * option to execute the command. 2968 */ 2969 argv[0] = (char *) cp; 2970 argv[1] = "-c"; 2971 argv[2] = (char *) command; 2972 argv[3] = NULL; 2973 execve(shell, argv, env); 2974 perror(shell); 2975 exit(1); 2976 } 2977