1*19261079SEd Maste /* $OpenBSD: uidswap.c,v 1.42 2019/06/28 13:35:04 deraadt Exp $ */
2511b41d2SMark Murray /*
3511b41d2SMark Murray * Author: Tatu Ylonen <ylo@cs.hut.fi>
4511b41d2SMark Murray * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5511b41d2SMark Murray * All rights reserved
6511b41d2SMark Murray * Code for uid-swapping.
7b66f2d16SKris Kennaway *
8b66f2d16SKris Kennaway * As far as I am concerned, the code I have written for this software
9b66f2d16SKris Kennaway * can be used freely for any purpose. Any derived versions of this
10b66f2d16SKris Kennaway * software must be clearly marked as such, and if the derived work is
11b66f2d16SKris Kennaway * incompatible with the protocol description in the RFC file, it must be
12b66f2d16SKris Kennaway * called by a name other than "ssh" or "Secure Shell".
13511b41d2SMark Murray */
14511b41d2SMark Murray
15511b41d2SMark Murray #include "includes.h"
16761efaa7SDag-Erling Smørgrav
17761efaa7SDag-Erling Smørgrav #include <errno.h>
18761efaa7SDag-Erling Smørgrav #include <pwd.h>
19761efaa7SDag-Erling Smørgrav #include <string.h>
20761efaa7SDag-Erling Smørgrav #include <unistd.h>
21bc5531deSDag-Erling Smørgrav #include <limits.h>
22761efaa7SDag-Erling Smørgrav #include <stdarg.h>
23f7167e0eSDag-Erling Smørgrav #include <stdlib.h>
24761efaa7SDag-Erling Smørgrav
25761efaa7SDag-Erling Smørgrav #include <grp.h>
26511b41d2SMark Murray
271e8db6e2SBrian Feldman #include "log.h"
28511b41d2SMark Murray #include "uidswap.h"
29efcad6b7SDag-Erling Smørgrav #include "xmalloc.h"
30511b41d2SMark Murray
31511b41d2SMark Murray /*
32511b41d2SMark Murray * Note: all these functions must work in all of the following cases:
33511b41d2SMark Murray * 1. euid=0, ruid=0
34511b41d2SMark Murray * 2. euid=0, ruid!=0
35511b41d2SMark Murray * 3. euid!=0, ruid!=0
36511b41d2SMark Murray * Additionally, they must work regardless of whether the system has
37511b41d2SMark Murray * POSIX saved uids or not.
38511b41d2SMark Murray */
39511b41d2SMark Murray
4083d2307dSDag-Erling Smørgrav #if defined(_POSIX_SAVED_IDS) && !defined(BROKEN_SAVED_UIDS)
41511b41d2SMark Murray /* Lets assume that posix saved ids also work with seteuid, even though that
42511b41d2SMark Murray is not part of the posix specification. */
4383d2307dSDag-Erling Smørgrav #define SAVED_IDS_WORK_WITH_SETEUID
4483d2307dSDag-Erling Smørgrav /* Saved effective uid. */
4583d2307dSDag-Erling Smørgrav static uid_t saved_euid = 0;
4683d2307dSDag-Erling Smørgrav static gid_t saved_egid = 0;
4783d2307dSDag-Erling Smørgrav #endif
48511b41d2SMark Murray
49511b41d2SMark Murray /* Saved effective uid. */
501e8db6e2SBrian Feldman static int privileged = 0;
511e8db6e2SBrian Feldman static int temporarily_use_uid_effective = 0;
52190cef3dSDag-Erling Smørgrav static uid_t user_groups_uid;
53efcad6b7SDag-Erling Smørgrav static gid_t *saved_egroups = NULL, *user_groups = NULL;
541e8db6e2SBrian Feldman static int saved_egroupslen = -1, user_groupslen = -1;
55511b41d2SMark Murray
56511b41d2SMark Murray /*
57511b41d2SMark Murray * Temporarily changes to the given uid. If the effective user
58511b41d2SMark Murray * id is not root, this does nothing. This call cannot be nested.
59511b41d2SMark Murray */
60511b41d2SMark Murray void
temporarily_use_uid(struct passwd * pw)611e8db6e2SBrian Feldman temporarily_use_uid(struct passwd *pw)
62511b41d2SMark Murray {
631e8db6e2SBrian Feldman /* Save the current euid, and egroups. */
6483d2307dSDag-Erling Smørgrav #ifdef SAVED_IDS_WORK_WITH_SETEUID
65511b41d2SMark Murray saved_euid = geteuid();
6683d2307dSDag-Erling Smørgrav saved_egid = getegid();
674b17dab0SDag-Erling Smørgrav debug("temporarily_use_uid: %u/%u (e=%u/%u)",
684b17dab0SDag-Erling Smørgrav (u_int)pw->pw_uid, (u_int)pw->pw_gid,
694b17dab0SDag-Erling Smørgrav (u_int)saved_euid, (u_int)saved_egid);
705e8dbd04SDag-Erling Smørgrav #ifndef HAVE_CYGWIN
711e8db6e2SBrian Feldman if (saved_euid != 0) {
721e8db6e2SBrian Feldman privileged = 0;
731e8db6e2SBrian Feldman return;
741e8db6e2SBrian Feldman }
755e8dbd04SDag-Erling Smørgrav #endif
7683d2307dSDag-Erling Smørgrav #else
7783d2307dSDag-Erling Smørgrav if (geteuid() != 0) {
7883d2307dSDag-Erling Smørgrav privileged = 0;
7983d2307dSDag-Erling Smørgrav return;
8083d2307dSDag-Erling Smørgrav }
8183d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */
8283d2307dSDag-Erling Smørgrav
831e8db6e2SBrian Feldman privileged = 1;
841e8db6e2SBrian Feldman temporarily_use_uid_effective = 1;
85efcad6b7SDag-Erling Smørgrav
86efcad6b7SDag-Erling Smørgrav saved_egroupslen = getgroups(0, NULL);
87*19261079SEd Maste if (saved_egroupslen == -1)
881e8db6e2SBrian Feldman fatal("getgroups: %.100s", strerror(errno));
89efcad6b7SDag-Erling Smørgrav if (saved_egroupslen > 0) {
90557f75e5SDag-Erling Smørgrav saved_egroups = xreallocarray(saved_egroups,
91761efaa7SDag-Erling Smørgrav saved_egroupslen, sizeof(gid_t));
92*19261079SEd Maste if (getgroups(saved_egroupslen, saved_egroups) == -1)
93efcad6b7SDag-Erling Smørgrav fatal("getgroups: %.100s", strerror(errno));
94efcad6b7SDag-Erling Smørgrav } else { /* saved_egroupslen == 0 */
95e4a9863fSDag-Erling Smørgrav free(saved_egroups);
96190cef3dSDag-Erling Smørgrav saved_egroups = NULL;
97efcad6b7SDag-Erling Smørgrav }
98511b41d2SMark Murray
991e8db6e2SBrian Feldman /* set and save the user's groups */
100190cef3dSDag-Erling Smørgrav if (user_groupslen == -1 || user_groups_uid != pw->pw_uid) {
101*19261079SEd Maste if (initgroups(pw->pw_name, pw->pw_gid) == -1)
1021e8db6e2SBrian Feldman fatal("initgroups: %s: %.100s", pw->pw_name,
1031e8db6e2SBrian Feldman strerror(errno));
104efcad6b7SDag-Erling Smørgrav
105efcad6b7SDag-Erling Smørgrav user_groupslen = getgroups(0, NULL);
106*19261079SEd Maste if (user_groupslen == -1)
1071e8db6e2SBrian Feldman fatal("getgroups: %.100s", strerror(errno));
108efcad6b7SDag-Erling Smørgrav if (user_groupslen > 0) {
109557f75e5SDag-Erling Smørgrav user_groups = xreallocarray(user_groups,
110761efaa7SDag-Erling Smørgrav user_groupslen, sizeof(gid_t));
111*19261079SEd Maste if (getgroups(user_groupslen, user_groups) == -1)
112efcad6b7SDag-Erling Smørgrav fatal("getgroups: %.100s", strerror(errno));
113efcad6b7SDag-Erling Smørgrav } else { /* user_groupslen == 0 */
114e4a9863fSDag-Erling Smørgrav free(user_groups);
115190cef3dSDag-Erling Smørgrav user_groups = NULL;
116efcad6b7SDag-Erling Smørgrav }
117190cef3dSDag-Erling Smørgrav user_groups_uid = pw->pw_uid;
1181e8db6e2SBrian Feldman }
119511b41d2SMark Murray /* Set the effective uid to the given (unprivileged) uid. */
120*19261079SEd Maste if (setgroups(user_groupslen, user_groups) == -1)
1211e8db6e2SBrian Feldman fatal("setgroups: %.100s", strerror(errno));
12283d2307dSDag-Erling Smørgrav #ifndef SAVED_IDS_WORK_WITH_SETEUID
12383d2307dSDag-Erling Smørgrav /* Propagate the privileged gid to all of our gids. */
124*19261079SEd Maste if (setgid(getegid()) == -1)
12583d2307dSDag-Erling Smørgrav debug("setgid %u: %.100s", (u_int) getegid(), strerror(errno));
12683d2307dSDag-Erling Smørgrav /* Propagate the privileged uid to all of our uids. */
127*19261079SEd Maste if (setuid(geteuid()) == -1)
12883d2307dSDag-Erling Smørgrav debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno));
12983d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */
130*19261079SEd Maste if (setegid(pw->pw_gid) == -1)
1311e8db6e2SBrian Feldman fatal("setegid %u: %.100s", (u_int)pw->pw_gid,
1321e8db6e2SBrian Feldman strerror(errno));
1331e8db6e2SBrian Feldman if (seteuid(pw->pw_uid) == -1)
1341e8db6e2SBrian Feldman fatal("seteuid %u: %.100s", (u_int)pw->pw_uid,
1351e8db6e2SBrian Feldman strerror(errno));
136511b41d2SMark Murray }
137511b41d2SMark Murray
138511b41d2SMark Murray /*
1391e8db6e2SBrian Feldman * Restores to the original (privileged) uid.
140511b41d2SMark Murray */
141511b41d2SMark Murray void
restore_uid(void)1421e8db6e2SBrian Feldman restore_uid(void)
143511b41d2SMark Murray {
1441e8db6e2SBrian Feldman /* it's a no-op unless privileged */
1454b17dab0SDag-Erling Smørgrav if (!privileged) {
1464b17dab0SDag-Erling Smørgrav debug("restore_uid: (unprivileged)");
1471e8db6e2SBrian Feldman return;
1484b17dab0SDag-Erling Smørgrav }
1491e8db6e2SBrian Feldman if (!temporarily_use_uid_effective)
1501e8db6e2SBrian Feldman fatal("restore_uid: temporarily_use_uid not effective");
15183d2307dSDag-Erling Smørgrav
15283d2307dSDag-Erling Smørgrav #ifdef SAVED_IDS_WORK_WITH_SETEUID
1534b17dab0SDag-Erling Smørgrav debug("restore_uid: %u/%u", (u_int)saved_euid, (u_int)saved_egid);
1541e8db6e2SBrian Feldman /* Set the effective uid back to the saved privileged uid. */
155*19261079SEd Maste if (seteuid(saved_euid) == -1)
1561e8db6e2SBrian Feldman fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno));
157*19261079SEd Maste if (setegid(saved_egid) == -1)
1581e8db6e2SBrian Feldman fatal("setegid %u: %.100s", (u_int)saved_egid, strerror(errno));
15983d2307dSDag-Erling Smørgrav #else /* SAVED_IDS_WORK_WITH_SETEUID */
16083d2307dSDag-Erling Smørgrav /*
16183d2307dSDag-Erling Smørgrav * We are unable to restore the real uid to its unprivileged value.
16283d2307dSDag-Erling Smørgrav * Propagate the real uid (usually more privileged) to effective uid
16383d2307dSDag-Erling Smørgrav * as well.
16483d2307dSDag-Erling Smørgrav */
165*19261079SEd Maste if (setuid(getuid()) == -1)
166*19261079SEd Maste fatal("%s: setuid failed: %s", __func__, strerror(errno));
167*19261079SEd Maste if (setgid(getgid()) == -1)
168*19261079SEd Maste fatal("%s: setgid failed: %s", __func__, strerror(errno));
16983d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */
17083d2307dSDag-Erling Smørgrav
171*19261079SEd Maste if (setgroups(saved_egroupslen, saved_egroups) == -1)
17283d2307dSDag-Erling Smørgrav fatal("setgroups: %.100s", strerror(errno));
1731e8db6e2SBrian Feldman temporarily_use_uid_effective = 0;
174511b41d2SMark Murray }
175511b41d2SMark Murray
176511b41d2SMark Murray /*
177511b41d2SMark Murray * Permanently sets all uids to the given uid. This cannot be
178511b41d2SMark Murray * called while temporarily_use_uid is effective.
179511b41d2SMark Murray */
180511b41d2SMark Murray void
permanently_set_uid(struct passwd * pw)1811e8db6e2SBrian Feldman permanently_set_uid(struct passwd *pw)
182511b41d2SMark Murray {
183acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
184d95e11bfSDag-Erling Smørgrav uid_t old_uid = getuid();
185d95e11bfSDag-Erling Smørgrav gid_t old_gid = getgid();
186f7167e0eSDag-Erling Smørgrav #endif
187d95e11bfSDag-Erling Smørgrav
188761efaa7SDag-Erling Smørgrav if (pw == NULL)
189761efaa7SDag-Erling Smørgrav fatal("permanently_set_uid: no user given");
1901e8db6e2SBrian Feldman if (temporarily_use_uid_effective)
191545d5ecaSDag-Erling Smørgrav fatal("permanently_set_uid: temporarily_use_uid effective");
1924b17dab0SDag-Erling Smørgrav debug("permanently_set_uid: %u/%u", (u_int)pw->pw_uid,
1934b17dab0SDag-Erling Smørgrav (u_int)pw->pw_gid);
194d95e11bfSDag-Erling Smørgrav
195*19261079SEd Maste if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) == -1)
196d95e11bfSDag-Erling Smørgrav fatal("setresgid %u: %.100s", (u_int)pw->pw_gid, strerror(errno));
197d95e11bfSDag-Erling Smørgrav
198cce7d346SDag-Erling Smørgrav #ifdef __APPLE__
199cce7d346SDag-Erling Smørgrav /*
200cce7d346SDag-Erling Smørgrav * OS X requires initgroups after setgid to opt back into
201cce7d346SDag-Erling Smørgrav * memberd support for >16 supplemental groups.
202cce7d346SDag-Erling Smørgrav */
203*19261079SEd Maste if (initgroups(pw->pw_name, pw->pw_gid) == -1)
204cce7d346SDag-Erling Smørgrav fatal("initgroups %.100s %u: %.100s",
205cce7d346SDag-Erling Smørgrav pw->pw_name, (u_int)pw->pw_gid, strerror(errno));
206cce7d346SDag-Erling Smørgrav #endif
207cce7d346SDag-Erling Smørgrav
208*19261079SEd Maste if (setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid) == -1)
209d95e11bfSDag-Erling Smørgrav fatal("setresuid %u: %.100s", (u_int)pw->pw_uid, strerror(errno));
210d95e11bfSDag-Erling Smørgrav
211acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
212d95e11bfSDag-Erling Smørgrav /* Try restoration of GID if changed (test clearing of saved gid) */
2135e8dbd04SDag-Erling Smørgrav if (old_gid != pw->pw_gid && pw->pw_uid != 0 &&
214d95e11bfSDag-Erling Smørgrav (setgid(old_gid) != -1 || setegid(old_gid) != -1))
215d95e11bfSDag-Erling Smørgrav fatal("%s: was able to restore old [e]gid", __func__);
2165e8dbd04SDag-Erling Smørgrav #endif
217d95e11bfSDag-Erling Smørgrav
218d95e11bfSDag-Erling Smørgrav /* Verify GID drop was successful */
219d95e11bfSDag-Erling Smørgrav if (getgid() != pw->pw_gid || getegid() != pw->pw_gid) {
220d95e11bfSDag-Erling Smørgrav fatal("%s: egid incorrect gid:%u egid:%u (should be %u)",
221d95e11bfSDag-Erling Smørgrav __func__, (u_int)getgid(), (u_int)getegid(),
222d95e11bfSDag-Erling Smørgrav (u_int)pw->pw_gid);
223d95e11bfSDag-Erling Smørgrav }
224d95e11bfSDag-Erling Smørgrav
225acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
226d95e11bfSDag-Erling Smørgrav /* Try restoration of UID if changed (test clearing of saved uid) */
227d95e11bfSDag-Erling Smørgrav if (old_uid != pw->pw_uid &&
228d95e11bfSDag-Erling Smørgrav (setuid(old_uid) != -1 || seteuid(old_uid) != -1))
229d95e11bfSDag-Erling Smørgrav fatal("%s: was able to restore old [e]uid", __func__);
230d95e11bfSDag-Erling Smørgrav #endif
231d95e11bfSDag-Erling Smørgrav
232d95e11bfSDag-Erling Smørgrav /* Verify UID drop was successful */
233d95e11bfSDag-Erling Smørgrav if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid) {
234d95e11bfSDag-Erling Smørgrav fatal("%s: euid incorrect uid:%u euid:%u (should be %u)",
235d95e11bfSDag-Erling Smørgrav __func__, (u_int)getuid(), (u_int)geteuid(),
236d95e11bfSDag-Erling Smørgrav (u_int)pw->pw_uid);
237d95e11bfSDag-Erling Smørgrav }
238511b41d2SMark Murray }
239