xref: /freebsd/crypto/openssh/uidswap.c (revision 19261079b74319502c6ffa1249920079f0f69a72)
1*19261079SEd Maste /* $OpenBSD: uidswap.c,v 1.42 2019/06/28 13:35:04 deraadt Exp $ */
2511b41d2SMark Murray /*
3511b41d2SMark Murray  * Author: Tatu Ylonen <ylo@cs.hut.fi>
4511b41d2SMark Murray  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5511b41d2SMark Murray  *                    All rights reserved
6511b41d2SMark Murray  * Code for uid-swapping.
7b66f2d16SKris Kennaway  *
8b66f2d16SKris Kennaway  * As far as I am concerned, the code I have written for this software
9b66f2d16SKris Kennaway  * can be used freely for any purpose.  Any derived versions of this
10b66f2d16SKris Kennaway  * software must be clearly marked as such, and if the derived work is
11b66f2d16SKris Kennaway  * incompatible with the protocol description in the RFC file, it must be
12b66f2d16SKris Kennaway  * called by a name other than "ssh" or "Secure Shell".
13511b41d2SMark Murray  */
14511b41d2SMark Murray 
15511b41d2SMark Murray #include "includes.h"
16761efaa7SDag-Erling Smørgrav 
17761efaa7SDag-Erling Smørgrav #include <errno.h>
18761efaa7SDag-Erling Smørgrav #include <pwd.h>
19761efaa7SDag-Erling Smørgrav #include <string.h>
20761efaa7SDag-Erling Smørgrav #include <unistd.h>
21bc5531deSDag-Erling Smørgrav #include <limits.h>
22761efaa7SDag-Erling Smørgrav #include <stdarg.h>
23f7167e0eSDag-Erling Smørgrav #include <stdlib.h>
24761efaa7SDag-Erling Smørgrav 
25761efaa7SDag-Erling Smørgrav #include <grp.h>
26511b41d2SMark Murray 
271e8db6e2SBrian Feldman #include "log.h"
28511b41d2SMark Murray #include "uidswap.h"
29efcad6b7SDag-Erling Smørgrav #include "xmalloc.h"
30511b41d2SMark Murray 
31511b41d2SMark Murray /*
32511b41d2SMark Murray  * Note: all these functions must work in all of the following cases:
33511b41d2SMark Murray  *    1. euid=0, ruid=0
34511b41d2SMark Murray  *    2. euid=0, ruid!=0
35511b41d2SMark Murray  *    3. euid!=0, ruid!=0
36511b41d2SMark Murray  * Additionally, they must work regardless of whether the system has
37511b41d2SMark Murray  * POSIX saved uids or not.
38511b41d2SMark Murray  */
39511b41d2SMark Murray 
4083d2307dSDag-Erling Smørgrav #if defined(_POSIX_SAVED_IDS) && !defined(BROKEN_SAVED_UIDS)
41511b41d2SMark Murray /* Lets assume that posix saved ids also work with seteuid, even though that
42511b41d2SMark Murray    is not part of the posix specification. */
4383d2307dSDag-Erling Smørgrav #define SAVED_IDS_WORK_WITH_SETEUID
4483d2307dSDag-Erling Smørgrav /* Saved effective uid. */
4583d2307dSDag-Erling Smørgrav static uid_t	saved_euid = 0;
4683d2307dSDag-Erling Smørgrav static gid_t	saved_egid = 0;
4783d2307dSDag-Erling Smørgrav #endif
48511b41d2SMark Murray 
49511b41d2SMark Murray /* Saved effective uid. */
501e8db6e2SBrian Feldman static int	privileged = 0;
511e8db6e2SBrian Feldman static int	temporarily_use_uid_effective = 0;
52190cef3dSDag-Erling Smørgrav static uid_t	user_groups_uid;
53efcad6b7SDag-Erling Smørgrav static gid_t	*saved_egroups = NULL, *user_groups = NULL;
541e8db6e2SBrian Feldman static int	saved_egroupslen = -1, user_groupslen = -1;
55511b41d2SMark Murray 
56511b41d2SMark Murray /*
57511b41d2SMark Murray  * Temporarily changes to the given uid.  If the effective user
58511b41d2SMark Murray  * id is not root, this does nothing.  This call cannot be nested.
59511b41d2SMark Murray  */
60511b41d2SMark Murray void
temporarily_use_uid(struct passwd * pw)611e8db6e2SBrian Feldman temporarily_use_uid(struct passwd *pw)
62511b41d2SMark Murray {
631e8db6e2SBrian Feldman 	/* Save the current euid, and egroups. */
6483d2307dSDag-Erling Smørgrav #ifdef SAVED_IDS_WORK_WITH_SETEUID
65511b41d2SMark Murray 	saved_euid = geteuid();
6683d2307dSDag-Erling Smørgrav 	saved_egid = getegid();
674b17dab0SDag-Erling Smørgrav 	debug("temporarily_use_uid: %u/%u (e=%u/%u)",
684b17dab0SDag-Erling Smørgrav 	    (u_int)pw->pw_uid, (u_int)pw->pw_gid,
694b17dab0SDag-Erling Smørgrav 	    (u_int)saved_euid, (u_int)saved_egid);
705e8dbd04SDag-Erling Smørgrav #ifndef HAVE_CYGWIN
711e8db6e2SBrian Feldman 	if (saved_euid != 0) {
721e8db6e2SBrian Feldman 		privileged = 0;
731e8db6e2SBrian Feldman 		return;
741e8db6e2SBrian Feldman 	}
755e8dbd04SDag-Erling Smørgrav #endif
7683d2307dSDag-Erling Smørgrav #else
7783d2307dSDag-Erling Smørgrav 	if (geteuid() != 0) {
7883d2307dSDag-Erling Smørgrav 		privileged = 0;
7983d2307dSDag-Erling Smørgrav 		return;
8083d2307dSDag-Erling Smørgrav 	}
8183d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */
8283d2307dSDag-Erling Smørgrav 
831e8db6e2SBrian Feldman 	privileged = 1;
841e8db6e2SBrian Feldman 	temporarily_use_uid_effective = 1;
85efcad6b7SDag-Erling Smørgrav 
86efcad6b7SDag-Erling Smørgrav 	saved_egroupslen = getgroups(0, NULL);
87*19261079SEd Maste 	if (saved_egroupslen == -1)
881e8db6e2SBrian Feldman 		fatal("getgroups: %.100s", strerror(errno));
89efcad6b7SDag-Erling Smørgrav 	if (saved_egroupslen > 0) {
90557f75e5SDag-Erling Smørgrav 		saved_egroups = xreallocarray(saved_egroups,
91761efaa7SDag-Erling Smørgrav 		    saved_egroupslen, sizeof(gid_t));
92*19261079SEd Maste 		if (getgroups(saved_egroupslen, saved_egroups) == -1)
93efcad6b7SDag-Erling Smørgrav 			fatal("getgroups: %.100s", strerror(errno));
94efcad6b7SDag-Erling Smørgrav 	} else { /* saved_egroupslen == 0 */
95e4a9863fSDag-Erling Smørgrav 		free(saved_egroups);
96190cef3dSDag-Erling Smørgrav 		saved_egroups = NULL;
97efcad6b7SDag-Erling Smørgrav 	}
98511b41d2SMark Murray 
991e8db6e2SBrian Feldman 	/* set and save the user's groups */
100190cef3dSDag-Erling Smørgrav 	if (user_groupslen == -1 || user_groups_uid != pw->pw_uid) {
101*19261079SEd Maste 		if (initgroups(pw->pw_name, pw->pw_gid) == -1)
1021e8db6e2SBrian Feldman 			fatal("initgroups: %s: %.100s", pw->pw_name,
1031e8db6e2SBrian Feldman 			    strerror(errno));
104efcad6b7SDag-Erling Smørgrav 
105efcad6b7SDag-Erling Smørgrav 		user_groupslen = getgroups(0, NULL);
106*19261079SEd Maste 		if (user_groupslen == -1)
1071e8db6e2SBrian Feldman 			fatal("getgroups: %.100s", strerror(errno));
108efcad6b7SDag-Erling Smørgrav 		if (user_groupslen > 0) {
109557f75e5SDag-Erling Smørgrav 			user_groups = xreallocarray(user_groups,
110761efaa7SDag-Erling Smørgrav 			    user_groupslen, sizeof(gid_t));
111*19261079SEd Maste 			if (getgroups(user_groupslen, user_groups) == -1)
112efcad6b7SDag-Erling Smørgrav 				fatal("getgroups: %.100s", strerror(errno));
113efcad6b7SDag-Erling Smørgrav 		} else { /* user_groupslen == 0 */
114e4a9863fSDag-Erling Smørgrav 			free(user_groups);
115190cef3dSDag-Erling Smørgrav 			user_groups = NULL;
116efcad6b7SDag-Erling Smørgrav 		}
117190cef3dSDag-Erling Smørgrav 		user_groups_uid = pw->pw_uid;
1181e8db6e2SBrian Feldman 	}
119511b41d2SMark Murray 	/* Set the effective uid to the given (unprivileged) uid. */
120*19261079SEd Maste 	if (setgroups(user_groupslen, user_groups) == -1)
1211e8db6e2SBrian Feldman 		fatal("setgroups: %.100s", strerror(errno));
12283d2307dSDag-Erling Smørgrav #ifndef SAVED_IDS_WORK_WITH_SETEUID
12383d2307dSDag-Erling Smørgrav 	/* Propagate the privileged gid to all of our gids. */
124*19261079SEd Maste 	if (setgid(getegid()) == -1)
12583d2307dSDag-Erling Smørgrav 		debug("setgid %u: %.100s", (u_int) getegid(), strerror(errno));
12683d2307dSDag-Erling Smørgrav 	/* Propagate the privileged uid to all of our uids. */
127*19261079SEd Maste 	if (setuid(geteuid()) == -1)
12883d2307dSDag-Erling Smørgrav 		debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno));
12983d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */
130*19261079SEd Maste 	if (setegid(pw->pw_gid) == -1)
1311e8db6e2SBrian Feldman 		fatal("setegid %u: %.100s", (u_int)pw->pw_gid,
1321e8db6e2SBrian Feldman 		    strerror(errno));
1331e8db6e2SBrian Feldman 	if (seteuid(pw->pw_uid) == -1)
1341e8db6e2SBrian Feldman 		fatal("seteuid %u: %.100s", (u_int)pw->pw_uid,
1351e8db6e2SBrian Feldman 		    strerror(errno));
136511b41d2SMark Murray }
137511b41d2SMark Murray 
138511b41d2SMark Murray /*
1391e8db6e2SBrian Feldman  * Restores to the original (privileged) uid.
140511b41d2SMark Murray  */
141511b41d2SMark Murray void
restore_uid(void)1421e8db6e2SBrian Feldman restore_uid(void)
143511b41d2SMark Murray {
1441e8db6e2SBrian Feldman 	/* it's a no-op unless privileged */
1454b17dab0SDag-Erling Smørgrav 	if (!privileged) {
1464b17dab0SDag-Erling Smørgrav 		debug("restore_uid: (unprivileged)");
1471e8db6e2SBrian Feldman 		return;
1484b17dab0SDag-Erling Smørgrav 	}
1491e8db6e2SBrian Feldman 	if (!temporarily_use_uid_effective)
1501e8db6e2SBrian Feldman 		fatal("restore_uid: temporarily_use_uid not effective");
15183d2307dSDag-Erling Smørgrav 
15283d2307dSDag-Erling Smørgrav #ifdef SAVED_IDS_WORK_WITH_SETEUID
1534b17dab0SDag-Erling Smørgrav 	debug("restore_uid: %u/%u", (u_int)saved_euid, (u_int)saved_egid);
1541e8db6e2SBrian Feldman 	/* Set the effective uid back to the saved privileged uid. */
155*19261079SEd Maste 	if (seteuid(saved_euid) == -1)
1561e8db6e2SBrian Feldman 		fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno));
157*19261079SEd Maste 	if (setegid(saved_egid) == -1)
1581e8db6e2SBrian Feldman 		fatal("setegid %u: %.100s", (u_int)saved_egid, strerror(errno));
15983d2307dSDag-Erling Smørgrav #else /* SAVED_IDS_WORK_WITH_SETEUID */
16083d2307dSDag-Erling Smørgrav 	/*
16183d2307dSDag-Erling Smørgrav 	 * We are unable to restore the real uid to its unprivileged value.
16283d2307dSDag-Erling Smørgrav 	 * Propagate the real uid (usually more privileged) to effective uid
16383d2307dSDag-Erling Smørgrav 	 * as well.
16483d2307dSDag-Erling Smørgrav 	 */
165*19261079SEd Maste 	if (setuid(getuid()) == -1)
166*19261079SEd Maste 		fatal("%s: setuid failed: %s", __func__, strerror(errno));
167*19261079SEd Maste 	if (setgid(getgid()) == -1)
168*19261079SEd Maste 		fatal("%s: setgid failed: %s", __func__, strerror(errno));
16983d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */
17083d2307dSDag-Erling Smørgrav 
171*19261079SEd Maste 	if (setgroups(saved_egroupslen, saved_egroups) == -1)
17283d2307dSDag-Erling Smørgrav 		fatal("setgroups: %.100s", strerror(errno));
1731e8db6e2SBrian Feldman 	temporarily_use_uid_effective = 0;
174511b41d2SMark Murray }
175511b41d2SMark Murray 
176511b41d2SMark Murray /*
177511b41d2SMark Murray  * Permanently sets all uids to the given uid.  This cannot be
178511b41d2SMark Murray  * called while temporarily_use_uid is effective.
179511b41d2SMark Murray  */
180511b41d2SMark Murray void
permanently_set_uid(struct passwd * pw)1811e8db6e2SBrian Feldman permanently_set_uid(struct passwd *pw)
182511b41d2SMark Murray {
183acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
184d95e11bfSDag-Erling Smørgrav 	uid_t old_uid = getuid();
185d95e11bfSDag-Erling Smørgrav 	gid_t old_gid = getgid();
186f7167e0eSDag-Erling Smørgrav #endif
187d95e11bfSDag-Erling Smørgrav 
188761efaa7SDag-Erling Smørgrav 	if (pw == NULL)
189761efaa7SDag-Erling Smørgrav 		fatal("permanently_set_uid: no user given");
1901e8db6e2SBrian Feldman 	if (temporarily_use_uid_effective)
191545d5ecaSDag-Erling Smørgrav 		fatal("permanently_set_uid: temporarily_use_uid effective");
1924b17dab0SDag-Erling Smørgrav 	debug("permanently_set_uid: %u/%u", (u_int)pw->pw_uid,
1934b17dab0SDag-Erling Smørgrav 	    (u_int)pw->pw_gid);
194d95e11bfSDag-Erling Smørgrav 
195*19261079SEd Maste 	if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) == -1)
196d95e11bfSDag-Erling Smørgrav 		fatal("setresgid %u: %.100s", (u_int)pw->pw_gid, strerror(errno));
197d95e11bfSDag-Erling Smørgrav 
198cce7d346SDag-Erling Smørgrav #ifdef __APPLE__
199cce7d346SDag-Erling Smørgrav 	/*
200cce7d346SDag-Erling Smørgrav 	 * OS X requires initgroups after setgid to opt back into
201cce7d346SDag-Erling Smørgrav 	 * memberd support for >16 supplemental groups.
202cce7d346SDag-Erling Smørgrav 	 */
203*19261079SEd Maste 	if (initgroups(pw->pw_name, pw->pw_gid) == -1)
204cce7d346SDag-Erling Smørgrav 		fatal("initgroups %.100s %u: %.100s",
205cce7d346SDag-Erling Smørgrav 		    pw->pw_name, (u_int)pw->pw_gid, strerror(errno));
206cce7d346SDag-Erling Smørgrav #endif
207cce7d346SDag-Erling Smørgrav 
208*19261079SEd Maste 	if (setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid) == -1)
209d95e11bfSDag-Erling Smørgrav 		fatal("setresuid %u: %.100s", (u_int)pw->pw_uid, strerror(errno));
210d95e11bfSDag-Erling Smørgrav 
211acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
212d95e11bfSDag-Erling Smørgrav 	/* Try restoration of GID if changed (test clearing of saved gid) */
2135e8dbd04SDag-Erling Smørgrav 	if (old_gid != pw->pw_gid && pw->pw_uid != 0 &&
214d95e11bfSDag-Erling Smørgrav 	    (setgid(old_gid) != -1 || setegid(old_gid) != -1))
215d95e11bfSDag-Erling Smørgrav 		fatal("%s: was able to restore old [e]gid", __func__);
2165e8dbd04SDag-Erling Smørgrav #endif
217d95e11bfSDag-Erling Smørgrav 
218d95e11bfSDag-Erling Smørgrav 	/* Verify GID drop was successful */
219d95e11bfSDag-Erling Smørgrav 	if (getgid() != pw->pw_gid || getegid() != pw->pw_gid) {
220d95e11bfSDag-Erling Smørgrav 		fatal("%s: egid incorrect gid:%u egid:%u (should be %u)",
221d95e11bfSDag-Erling Smørgrav 		    __func__, (u_int)getgid(), (u_int)getegid(),
222d95e11bfSDag-Erling Smørgrav 		    (u_int)pw->pw_gid);
223d95e11bfSDag-Erling Smørgrav 	}
224d95e11bfSDag-Erling Smørgrav 
225acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
226d95e11bfSDag-Erling Smørgrav 	/* Try restoration of UID if changed (test clearing of saved uid) */
227d95e11bfSDag-Erling Smørgrav 	if (old_uid != pw->pw_uid &&
228d95e11bfSDag-Erling Smørgrav 	    (setuid(old_uid) != -1 || seteuid(old_uid) != -1))
229d95e11bfSDag-Erling Smørgrav 		fatal("%s: was able to restore old [e]uid", __func__);
230d95e11bfSDag-Erling Smørgrav #endif
231d95e11bfSDag-Erling Smørgrav 
232d95e11bfSDag-Erling Smørgrav 	/* Verify UID drop was successful */
233d95e11bfSDag-Erling Smørgrav 	if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid) {
234d95e11bfSDag-Erling Smørgrav 		fatal("%s: euid incorrect uid:%u euid:%u (should be %u)",
235d95e11bfSDag-Erling Smørgrav 		    __func__, (u_int)getuid(), (u_int)geteuid(),
236d95e11bfSDag-Erling Smørgrav 		    (u_int)pw->pw_uid);
237d95e11bfSDag-Erling Smørgrav 	}
238511b41d2SMark Murray }
239