1*190cef3dSDag-Erling Smørgrav /* $OpenBSD: uidswap.c,v 1.41 2018/07/18 11:34:04 dtucker Exp $ */ 2511b41d2SMark Murray /* 3511b41d2SMark Murray * Author: Tatu Ylonen <ylo@cs.hut.fi> 4511b41d2SMark Murray * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 5511b41d2SMark Murray * All rights reserved 6511b41d2SMark Murray * Code for uid-swapping. 7b66f2d16SKris Kennaway * 8b66f2d16SKris Kennaway * As far as I am concerned, the code I have written for this software 9b66f2d16SKris Kennaway * can be used freely for any purpose. Any derived versions of this 10b66f2d16SKris Kennaway * software must be clearly marked as such, and if the derived work is 11b66f2d16SKris Kennaway * incompatible with the protocol description in the RFC file, it must be 12b66f2d16SKris Kennaway * called by a name other than "ssh" or "Secure Shell". 13511b41d2SMark Murray */ 14511b41d2SMark Murray 15511b41d2SMark Murray #include "includes.h" 16761efaa7SDag-Erling Smørgrav 17761efaa7SDag-Erling Smørgrav #include <errno.h> 18761efaa7SDag-Erling Smørgrav #include <pwd.h> 19761efaa7SDag-Erling Smørgrav #include <string.h> 20761efaa7SDag-Erling Smørgrav #include <unistd.h> 21bc5531deSDag-Erling Smørgrav #include <limits.h> 22761efaa7SDag-Erling Smørgrav #include <stdarg.h> 23f7167e0eSDag-Erling Smørgrav #include <stdlib.h> 24761efaa7SDag-Erling Smørgrav 25761efaa7SDag-Erling Smørgrav #include <grp.h> 26511b41d2SMark Murray 271e8db6e2SBrian Feldman #include "log.h" 28511b41d2SMark Murray #include "uidswap.h" 29efcad6b7SDag-Erling Smørgrav #include "xmalloc.h" 30511b41d2SMark Murray 31511b41d2SMark Murray /* 32511b41d2SMark Murray * Note: all these functions must work in all of the following cases: 33511b41d2SMark Murray * 1. euid=0, ruid=0 34511b41d2SMark Murray * 2. euid=0, ruid!=0 35511b41d2SMark Murray * 3. euid!=0, ruid!=0 36511b41d2SMark Murray * Additionally, they must work regardless of whether the system has 37511b41d2SMark Murray * POSIX saved uids or not. 38511b41d2SMark Murray */ 39511b41d2SMark Murray 4083d2307dSDag-Erling Smørgrav #if defined(_POSIX_SAVED_IDS) && !defined(BROKEN_SAVED_UIDS) 41511b41d2SMark Murray /* Lets assume that posix saved ids also work with seteuid, even though that 42511b41d2SMark Murray is not part of the posix specification. */ 4383d2307dSDag-Erling Smørgrav #define SAVED_IDS_WORK_WITH_SETEUID 4483d2307dSDag-Erling Smørgrav /* Saved effective uid. */ 4583d2307dSDag-Erling Smørgrav static uid_t saved_euid = 0; 4683d2307dSDag-Erling Smørgrav static gid_t saved_egid = 0; 4783d2307dSDag-Erling Smørgrav #endif 48511b41d2SMark Murray 49511b41d2SMark Murray /* Saved effective uid. */ 501e8db6e2SBrian Feldman static int privileged = 0; 511e8db6e2SBrian Feldman static int temporarily_use_uid_effective = 0; 52*190cef3dSDag-Erling Smørgrav static uid_t user_groups_uid; 53efcad6b7SDag-Erling Smørgrav static gid_t *saved_egroups = NULL, *user_groups = NULL; 541e8db6e2SBrian Feldman static int saved_egroupslen = -1, user_groupslen = -1; 55511b41d2SMark Murray 56511b41d2SMark Murray /* 57511b41d2SMark Murray * Temporarily changes to the given uid. If the effective user 58511b41d2SMark Murray * id is not root, this does nothing. This call cannot be nested. 59511b41d2SMark Murray */ 60511b41d2SMark Murray void 611e8db6e2SBrian Feldman temporarily_use_uid(struct passwd *pw) 62511b41d2SMark Murray { 631e8db6e2SBrian Feldman /* Save the current euid, and egroups. */ 6483d2307dSDag-Erling Smørgrav #ifdef SAVED_IDS_WORK_WITH_SETEUID 65511b41d2SMark Murray saved_euid = geteuid(); 6683d2307dSDag-Erling Smørgrav saved_egid = getegid(); 674b17dab0SDag-Erling Smørgrav debug("temporarily_use_uid: %u/%u (e=%u/%u)", 684b17dab0SDag-Erling Smørgrav (u_int)pw->pw_uid, (u_int)pw->pw_gid, 694b17dab0SDag-Erling Smørgrav (u_int)saved_euid, (u_int)saved_egid); 705e8dbd04SDag-Erling Smørgrav #ifndef HAVE_CYGWIN 711e8db6e2SBrian Feldman if (saved_euid != 0) { 721e8db6e2SBrian Feldman privileged = 0; 731e8db6e2SBrian Feldman return; 741e8db6e2SBrian Feldman } 755e8dbd04SDag-Erling Smørgrav #endif 7683d2307dSDag-Erling Smørgrav #else 7783d2307dSDag-Erling Smørgrav if (geteuid() != 0) { 7883d2307dSDag-Erling Smørgrav privileged = 0; 7983d2307dSDag-Erling Smørgrav return; 8083d2307dSDag-Erling Smørgrav } 8183d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */ 8283d2307dSDag-Erling Smørgrav 831e8db6e2SBrian Feldman privileged = 1; 841e8db6e2SBrian Feldman temporarily_use_uid_effective = 1; 85efcad6b7SDag-Erling Smørgrav 86efcad6b7SDag-Erling Smørgrav saved_egroupslen = getgroups(0, NULL); 871e8db6e2SBrian Feldman if (saved_egroupslen < 0) 881e8db6e2SBrian Feldman fatal("getgroups: %.100s", strerror(errno)); 89efcad6b7SDag-Erling Smørgrav if (saved_egroupslen > 0) { 90557f75e5SDag-Erling Smørgrav saved_egroups = xreallocarray(saved_egroups, 91761efaa7SDag-Erling Smørgrav saved_egroupslen, sizeof(gid_t)); 92efcad6b7SDag-Erling Smørgrav if (getgroups(saved_egroupslen, saved_egroups) < 0) 93efcad6b7SDag-Erling Smørgrav fatal("getgroups: %.100s", strerror(errno)); 94efcad6b7SDag-Erling Smørgrav } else { /* saved_egroupslen == 0 */ 95e4a9863fSDag-Erling Smørgrav free(saved_egroups); 96*190cef3dSDag-Erling Smørgrav saved_egroups = NULL; 97efcad6b7SDag-Erling Smørgrav } 98511b41d2SMark Murray 991e8db6e2SBrian Feldman /* set and save the user's groups */ 100*190cef3dSDag-Erling Smørgrav if (user_groupslen == -1 || user_groups_uid != pw->pw_uid) { 1011e8db6e2SBrian Feldman if (initgroups(pw->pw_name, pw->pw_gid) < 0) 1021e8db6e2SBrian Feldman fatal("initgroups: %s: %.100s", pw->pw_name, 1031e8db6e2SBrian Feldman strerror(errno)); 104efcad6b7SDag-Erling Smørgrav 105efcad6b7SDag-Erling Smørgrav user_groupslen = getgroups(0, NULL); 1061e8db6e2SBrian Feldman if (user_groupslen < 0) 1071e8db6e2SBrian Feldman fatal("getgroups: %.100s", strerror(errno)); 108efcad6b7SDag-Erling Smørgrav if (user_groupslen > 0) { 109557f75e5SDag-Erling Smørgrav user_groups = xreallocarray(user_groups, 110761efaa7SDag-Erling Smørgrav user_groupslen, sizeof(gid_t)); 111efcad6b7SDag-Erling Smørgrav if (getgroups(user_groupslen, user_groups) < 0) 112efcad6b7SDag-Erling Smørgrav fatal("getgroups: %.100s", strerror(errno)); 113efcad6b7SDag-Erling Smørgrav } else { /* user_groupslen == 0 */ 114e4a9863fSDag-Erling Smørgrav free(user_groups); 115*190cef3dSDag-Erling Smørgrav user_groups = NULL; 116efcad6b7SDag-Erling Smørgrav } 117*190cef3dSDag-Erling Smørgrav user_groups_uid = pw->pw_uid; 1181e8db6e2SBrian Feldman } 119511b41d2SMark Murray /* Set the effective uid to the given (unprivileged) uid. */ 1201e8db6e2SBrian Feldman if (setgroups(user_groupslen, user_groups) < 0) 1211e8db6e2SBrian Feldman fatal("setgroups: %.100s", strerror(errno)); 12283d2307dSDag-Erling Smørgrav #ifndef SAVED_IDS_WORK_WITH_SETEUID 12383d2307dSDag-Erling Smørgrav /* Propagate the privileged gid to all of our gids. */ 12483d2307dSDag-Erling Smørgrav if (setgid(getegid()) < 0) 12583d2307dSDag-Erling Smørgrav debug("setgid %u: %.100s", (u_int) getegid(), strerror(errno)); 12683d2307dSDag-Erling Smørgrav /* Propagate the privileged uid to all of our uids. */ 12783d2307dSDag-Erling Smørgrav if (setuid(geteuid()) < 0) 12883d2307dSDag-Erling Smørgrav debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno)); 12983d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */ 1301e8db6e2SBrian Feldman if (setegid(pw->pw_gid) < 0) 1311e8db6e2SBrian Feldman fatal("setegid %u: %.100s", (u_int)pw->pw_gid, 1321e8db6e2SBrian Feldman strerror(errno)); 1331e8db6e2SBrian Feldman if (seteuid(pw->pw_uid) == -1) 1341e8db6e2SBrian Feldman fatal("seteuid %u: %.100s", (u_int)pw->pw_uid, 1351e8db6e2SBrian Feldman strerror(errno)); 136511b41d2SMark Murray } 137511b41d2SMark Murray 138511b41d2SMark Murray /* 1391e8db6e2SBrian Feldman * Restores to the original (privileged) uid. 140511b41d2SMark Murray */ 141511b41d2SMark Murray void 1421e8db6e2SBrian Feldman restore_uid(void) 143511b41d2SMark Murray { 1441e8db6e2SBrian Feldman /* it's a no-op unless privileged */ 1454b17dab0SDag-Erling Smørgrav if (!privileged) { 1464b17dab0SDag-Erling Smørgrav debug("restore_uid: (unprivileged)"); 1471e8db6e2SBrian Feldman return; 1484b17dab0SDag-Erling Smørgrav } 1491e8db6e2SBrian Feldman if (!temporarily_use_uid_effective) 1501e8db6e2SBrian Feldman fatal("restore_uid: temporarily_use_uid not effective"); 15183d2307dSDag-Erling Smørgrav 15283d2307dSDag-Erling Smørgrav #ifdef SAVED_IDS_WORK_WITH_SETEUID 1534b17dab0SDag-Erling Smørgrav debug("restore_uid: %u/%u", (u_int)saved_euid, (u_int)saved_egid); 1541e8db6e2SBrian Feldman /* Set the effective uid back to the saved privileged uid. */ 155511b41d2SMark Murray if (seteuid(saved_euid) < 0) 1561e8db6e2SBrian Feldman fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno)); 1571e8db6e2SBrian Feldman if (setegid(saved_egid) < 0) 1581e8db6e2SBrian Feldman fatal("setegid %u: %.100s", (u_int)saved_egid, strerror(errno)); 15983d2307dSDag-Erling Smørgrav #else /* SAVED_IDS_WORK_WITH_SETEUID */ 16083d2307dSDag-Erling Smørgrav /* 16183d2307dSDag-Erling Smørgrav * We are unable to restore the real uid to its unprivileged value. 16283d2307dSDag-Erling Smørgrav * Propagate the real uid (usually more privileged) to effective uid 16383d2307dSDag-Erling Smørgrav * as well. 16483d2307dSDag-Erling Smørgrav */ 16583d2307dSDag-Erling Smørgrav setuid(getuid()); 16683d2307dSDag-Erling Smørgrav setgid(getgid()); 16783d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */ 16883d2307dSDag-Erling Smørgrav 16983d2307dSDag-Erling Smørgrav if (setgroups(saved_egroupslen, saved_egroups) < 0) 17083d2307dSDag-Erling Smørgrav fatal("setgroups: %.100s", strerror(errno)); 1711e8db6e2SBrian Feldman temporarily_use_uid_effective = 0; 172511b41d2SMark Murray } 173511b41d2SMark Murray 174511b41d2SMark Murray /* 175511b41d2SMark Murray * Permanently sets all uids to the given uid. This cannot be 176511b41d2SMark Murray * called while temporarily_use_uid is effective. 177511b41d2SMark Murray */ 178511b41d2SMark Murray void 1791e8db6e2SBrian Feldman permanently_set_uid(struct passwd *pw) 180511b41d2SMark Murray { 181acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST 182d95e11bfSDag-Erling Smørgrav uid_t old_uid = getuid(); 183d95e11bfSDag-Erling Smørgrav gid_t old_gid = getgid(); 184f7167e0eSDag-Erling Smørgrav #endif 185d95e11bfSDag-Erling Smørgrav 186761efaa7SDag-Erling Smørgrav if (pw == NULL) 187761efaa7SDag-Erling Smørgrav fatal("permanently_set_uid: no user given"); 1881e8db6e2SBrian Feldman if (temporarily_use_uid_effective) 189545d5ecaSDag-Erling Smørgrav fatal("permanently_set_uid: temporarily_use_uid effective"); 1904b17dab0SDag-Erling Smørgrav debug("permanently_set_uid: %u/%u", (u_int)pw->pw_uid, 1914b17dab0SDag-Erling Smørgrav (u_int)pw->pw_gid); 192d95e11bfSDag-Erling Smørgrav 193d95e11bfSDag-Erling Smørgrav if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) < 0) 194d95e11bfSDag-Erling Smørgrav fatal("setresgid %u: %.100s", (u_int)pw->pw_gid, strerror(errno)); 195d95e11bfSDag-Erling Smørgrav 196cce7d346SDag-Erling Smørgrav #ifdef __APPLE__ 197cce7d346SDag-Erling Smørgrav /* 198cce7d346SDag-Erling Smørgrav * OS X requires initgroups after setgid to opt back into 199cce7d346SDag-Erling Smørgrav * memberd support for >16 supplemental groups. 200cce7d346SDag-Erling Smørgrav */ 201cce7d346SDag-Erling Smørgrav if (initgroups(pw->pw_name, pw->pw_gid) < 0) 202cce7d346SDag-Erling Smørgrav fatal("initgroups %.100s %u: %.100s", 203cce7d346SDag-Erling Smørgrav pw->pw_name, (u_int)pw->pw_gid, strerror(errno)); 204cce7d346SDag-Erling Smørgrav #endif 205cce7d346SDag-Erling Smørgrav 206d95e11bfSDag-Erling Smørgrav if (setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid) < 0) 207d95e11bfSDag-Erling Smørgrav fatal("setresuid %u: %.100s", (u_int)pw->pw_uid, strerror(errno)); 208d95e11bfSDag-Erling Smørgrav 209acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST 210d95e11bfSDag-Erling Smørgrav /* Try restoration of GID if changed (test clearing of saved gid) */ 2115e8dbd04SDag-Erling Smørgrav if (old_gid != pw->pw_gid && pw->pw_uid != 0 && 212d95e11bfSDag-Erling Smørgrav (setgid(old_gid) != -1 || setegid(old_gid) != -1)) 213d95e11bfSDag-Erling Smørgrav fatal("%s: was able to restore old [e]gid", __func__); 2145e8dbd04SDag-Erling Smørgrav #endif 215d95e11bfSDag-Erling Smørgrav 216d95e11bfSDag-Erling Smørgrav /* Verify GID drop was successful */ 217d95e11bfSDag-Erling Smørgrav if (getgid() != pw->pw_gid || getegid() != pw->pw_gid) { 218d95e11bfSDag-Erling Smørgrav fatal("%s: egid incorrect gid:%u egid:%u (should be %u)", 219d95e11bfSDag-Erling Smørgrav __func__, (u_int)getgid(), (u_int)getegid(), 220d95e11bfSDag-Erling Smørgrav (u_int)pw->pw_gid); 221d95e11bfSDag-Erling Smørgrav } 222d95e11bfSDag-Erling Smørgrav 223acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST 224d95e11bfSDag-Erling Smørgrav /* Try restoration of UID if changed (test clearing of saved uid) */ 225d95e11bfSDag-Erling Smørgrav if (old_uid != pw->pw_uid && 226d95e11bfSDag-Erling Smørgrav (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) 227d95e11bfSDag-Erling Smørgrav fatal("%s: was able to restore old [e]uid", __func__); 228d95e11bfSDag-Erling Smørgrav #endif 229d95e11bfSDag-Erling Smørgrav 230d95e11bfSDag-Erling Smørgrav /* Verify UID drop was successful */ 231d95e11bfSDag-Erling Smørgrav if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid) { 232d95e11bfSDag-Erling Smørgrav fatal("%s: euid incorrect uid:%u euid:%u (should be %u)", 233d95e11bfSDag-Erling Smørgrav __func__, (u_int)getuid(), (u_int)geteuid(), 234d95e11bfSDag-Erling Smørgrav (u_int)pw->pw_uid); 235d95e11bfSDag-Erling Smørgrav } 236511b41d2SMark Murray } 237