xref: /freebsd/crypto/openssh/uidswap.c (revision acc1a9ef8333c798c210fa94be6af4d5fe2dd794)
1557f75e5SDag-Erling Smørgrav /* $OpenBSD: uidswap.c,v 1.39 2015/06/24 01:49:19 dtucker Exp $ */
2511b41d2SMark Murray /*
3511b41d2SMark Murray  * Author: Tatu Ylonen <ylo@cs.hut.fi>
4511b41d2SMark Murray  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5511b41d2SMark Murray  *                    All rights reserved
6511b41d2SMark Murray  * Code for uid-swapping.
7b66f2d16SKris Kennaway  *
8b66f2d16SKris Kennaway  * As far as I am concerned, the code I have written for this software
9b66f2d16SKris Kennaway  * can be used freely for any purpose.  Any derived versions of this
10b66f2d16SKris Kennaway  * software must be clearly marked as such, and if the derived work is
11b66f2d16SKris Kennaway  * incompatible with the protocol description in the RFC file, it must be
12b66f2d16SKris Kennaway  * called by a name other than "ssh" or "Secure Shell".
13511b41d2SMark Murray  */
14511b41d2SMark Murray 
15511b41d2SMark Murray #include "includes.h"
16761efaa7SDag-Erling Smørgrav 
17761efaa7SDag-Erling Smørgrav #include <errno.h>
18761efaa7SDag-Erling Smørgrav #include <pwd.h>
19761efaa7SDag-Erling Smørgrav #include <string.h>
20761efaa7SDag-Erling Smørgrav #include <unistd.h>
21bc5531deSDag-Erling Smørgrav #include <limits.h>
22761efaa7SDag-Erling Smørgrav #include <stdarg.h>
23f7167e0eSDag-Erling Smørgrav #include <stdlib.h>
24761efaa7SDag-Erling Smørgrav 
25761efaa7SDag-Erling Smørgrav #include <grp.h>
26511b41d2SMark Murray 
271e8db6e2SBrian Feldman #include "log.h"
28511b41d2SMark Murray #include "uidswap.h"
29efcad6b7SDag-Erling Smørgrav #include "xmalloc.h"
30511b41d2SMark Murray 
31511b41d2SMark Murray /*
32511b41d2SMark Murray  * Note: all these functions must work in all of the following cases:
33511b41d2SMark Murray  *    1. euid=0, ruid=0
34511b41d2SMark Murray  *    2. euid=0, ruid!=0
35511b41d2SMark Murray  *    3. euid!=0, ruid!=0
36511b41d2SMark Murray  * Additionally, they must work regardless of whether the system has
37511b41d2SMark Murray  * POSIX saved uids or not.
38511b41d2SMark Murray  */
39511b41d2SMark Murray 
4083d2307dSDag-Erling Smørgrav #if defined(_POSIX_SAVED_IDS) && !defined(BROKEN_SAVED_UIDS)
41511b41d2SMark Murray /* Lets assume that posix saved ids also work with seteuid, even though that
42511b41d2SMark Murray    is not part of the posix specification. */
4383d2307dSDag-Erling Smørgrav #define SAVED_IDS_WORK_WITH_SETEUID
4483d2307dSDag-Erling Smørgrav /* Saved effective uid. */
4583d2307dSDag-Erling Smørgrav static uid_t 	saved_euid = 0;
4683d2307dSDag-Erling Smørgrav static gid_t	saved_egid = 0;
4783d2307dSDag-Erling Smørgrav #endif
48511b41d2SMark Murray 
49511b41d2SMark Murray /* Saved effective uid. */
501e8db6e2SBrian Feldman static int	privileged = 0;
511e8db6e2SBrian Feldman static int	temporarily_use_uid_effective = 0;
52efcad6b7SDag-Erling Smørgrav static gid_t	*saved_egroups = NULL, *user_groups = NULL;
531e8db6e2SBrian Feldman static int	saved_egroupslen = -1, user_groupslen = -1;
54511b41d2SMark Murray 
55511b41d2SMark Murray /*
56511b41d2SMark Murray  * Temporarily changes to the given uid.  If the effective user
57511b41d2SMark Murray  * id is not root, this does nothing.  This call cannot be nested.
58511b41d2SMark Murray  */
59511b41d2SMark Murray void
601e8db6e2SBrian Feldman temporarily_use_uid(struct passwd *pw)
61511b41d2SMark Murray {
621e8db6e2SBrian Feldman 	/* Save the current euid, and egroups. */
6383d2307dSDag-Erling Smørgrav #ifdef SAVED_IDS_WORK_WITH_SETEUID
64511b41d2SMark Murray 	saved_euid = geteuid();
6583d2307dSDag-Erling Smørgrav 	saved_egid = getegid();
664b17dab0SDag-Erling Smørgrav 	debug("temporarily_use_uid: %u/%u (e=%u/%u)",
674b17dab0SDag-Erling Smørgrav 	    (u_int)pw->pw_uid, (u_int)pw->pw_gid,
684b17dab0SDag-Erling Smørgrav 	    (u_int)saved_euid, (u_int)saved_egid);
695e8dbd04SDag-Erling Smørgrav #ifndef HAVE_CYGWIN
701e8db6e2SBrian Feldman 	if (saved_euid != 0) {
711e8db6e2SBrian Feldman 		privileged = 0;
721e8db6e2SBrian Feldman 		return;
731e8db6e2SBrian Feldman 	}
745e8dbd04SDag-Erling Smørgrav #endif
7583d2307dSDag-Erling Smørgrav #else
7683d2307dSDag-Erling Smørgrav 	if (geteuid() != 0) {
7783d2307dSDag-Erling Smørgrav 		privileged = 0;
7883d2307dSDag-Erling Smørgrav 		return;
7983d2307dSDag-Erling Smørgrav 	}
8083d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */
8183d2307dSDag-Erling Smørgrav 
821e8db6e2SBrian Feldman 	privileged = 1;
831e8db6e2SBrian Feldman 	temporarily_use_uid_effective = 1;
84efcad6b7SDag-Erling Smørgrav 
85efcad6b7SDag-Erling Smørgrav 	saved_egroupslen = getgroups(0, NULL);
861e8db6e2SBrian Feldman 	if (saved_egroupslen < 0)
871e8db6e2SBrian Feldman 		fatal("getgroups: %.100s", strerror(errno));
88efcad6b7SDag-Erling Smørgrav 	if (saved_egroupslen > 0) {
89557f75e5SDag-Erling Smørgrav 		saved_egroups = xreallocarray(saved_egroups,
90761efaa7SDag-Erling Smørgrav 		    saved_egroupslen, sizeof(gid_t));
91efcad6b7SDag-Erling Smørgrav 		if (getgroups(saved_egroupslen, saved_egroups) < 0)
92efcad6b7SDag-Erling Smørgrav 			fatal("getgroups: %.100s", strerror(errno));
93efcad6b7SDag-Erling Smørgrav 	} else { /* saved_egroupslen == 0 */
94e4a9863fSDag-Erling Smørgrav 		free(saved_egroups);
95efcad6b7SDag-Erling Smørgrav 	}
96511b41d2SMark Murray 
971e8db6e2SBrian Feldman 	/* set and save the user's groups */
981e8db6e2SBrian Feldman 	if (user_groupslen == -1) {
991e8db6e2SBrian Feldman 		if (initgroups(pw->pw_name, pw->pw_gid) < 0)
1001e8db6e2SBrian Feldman 			fatal("initgroups: %s: %.100s", pw->pw_name,
1011e8db6e2SBrian Feldman 			    strerror(errno));
102efcad6b7SDag-Erling Smørgrav 
103efcad6b7SDag-Erling Smørgrav 		user_groupslen = getgroups(0, NULL);
1041e8db6e2SBrian Feldman 		if (user_groupslen < 0)
1051e8db6e2SBrian Feldman 			fatal("getgroups: %.100s", strerror(errno));
106efcad6b7SDag-Erling Smørgrav 		if (user_groupslen > 0) {
107557f75e5SDag-Erling Smørgrav 			user_groups = xreallocarray(user_groups,
108761efaa7SDag-Erling Smørgrav 			    user_groupslen, sizeof(gid_t));
109efcad6b7SDag-Erling Smørgrav 			if (getgroups(user_groupslen, user_groups) < 0)
110efcad6b7SDag-Erling Smørgrav 				fatal("getgroups: %.100s", strerror(errno));
111efcad6b7SDag-Erling Smørgrav 		} else { /* user_groupslen == 0 */
112e4a9863fSDag-Erling Smørgrav 			free(user_groups);
113efcad6b7SDag-Erling Smørgrav 		}
1141e8db6e2SBrian Feldman 	}
115511b41d2SMark Murray 	/* Set the effective uid to the given (unprivileged) uid. */
1161e8db6e2SBrian Feldman 	if (setgroups(user_groupslen, user_groups) < 0)
1171e8db6e2SBrian Feldman 		fatal("setgroups: %.100s", strerror(errno));
11883d2307dSDag-Erling Smørgrav #ifndef SAVED_IDS_WORK_WITH_SETEUID
11983d2307dSDag-Erling Smørgrav 	/* Propagate the privileged gid to all of our gids. */
12083d2307dSDag-Erling Smørgrav 	if (setgid(getegid()) < 0)
12183d2307dSDag-Erling Smørgrav 		debug("setgid %u: %.100s", (u_int) getegid(), strerror(errno));
12283d2307dSDag-Erling Smørgrav 	/* Propagate the privileged uid to all of our uids. */
12383d2307dSDag-Erling Smørgrav 	if (setuid(geteuid()) < 0)
12483d2307dSDag-Erling Smørgrav 		debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno));
12583d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */
1261e8db6e2SBrian Feldman 	if (setegid(pw->pw_gid) < 0)
1271e8db6e2SBrian Feldman 		fatal("setegid %u: %.100s", (u_int)pw->pw_gid,
1281e8db6e2SBrian Feldman 		    strerror(errno));
1291e8db6e2SBrian Feldman 	if (seteuid(pw->pw_uid) == -1)
1301e8db6e2SBrian Feldman 		fatal("seteuid %u: %.100s", (u_int)pw->pw_uid,
1311e8db6e2SBrian Feldman 		    strerror(errno));
132511b41d2SMark Murray }
133511b41d2SMark Murray 
134761efaa7SDag-Erling Smørgrav void
135761efaa7SDag-Erling Smørgrav permanently_drop_suid(uid_t uid)
136761efaa7SDag-Erling Smørgrav {
137*acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
138761efaa7SDag-Erling Smørgrav 	uid_t old_uid = getuid();
139f7167e0eSDag-Erling Smørgrav #endif
140761efaa7SDag-Erling Smørgrav 
141761efaa7SDag-Erling Smørgrav 	debug("permanently_drop_suid: %u", (u_int)uid);
142761efaa7SDag-Erling Smørgrav 	if (setresuid(uid, uid, uid) < 0)
143761efaa7SDag-Erling Smørgrav 		fatal("setresuid %u: %.100s", (u_int)uid, strerror(errno));
144761efaa7SDag-Erling Smørgrav 
145*acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
146*acc1a9efSDag-Erling Smørgrav 	/*
147*acc1a9efSDag-Erling Smørgrav 	 * Try restoration of UID if changed (test clearing of saved uid).
148*acc1a9efSDag-Erling Smørgrav 	 *
149*acc1a9efSDag-Erling Smørgrav 	 * Note that we don't do this on Cygwin, or on Solaris-based platforms
150*acc1a9efSDag-Erling Smørgrav 	 * where fine-grained privileges are available (the user might be
151*acc1a9efSDag-Erling Smørgrav 	 * deliberately allowed the right to setuid back to root).
152*acc1a9efSDag-Erling Smørgrav 	 */
153761efaa7SDag-Erling Smørgrav 	if (old_uid != uid &&
154761efaa7SDag-Erling Smørgrav 	    (setuid(old_uid) != -1 || seteuid(old_uid) != -1))
155761efaa7SDag-Erling Smørgrav 		fatal("%s: was able to restore old [e]uid", __func__);
156761efaa7SDag-Erling Smørgrav #endif
157761efaa7SDag-Erling Smørgrav 
158761efaa7SDag-Erling Smørgrav 	/* Verify UID drop was successful */
159761efaa7SDag-Erling Smørgrav 	if (getuid() != uid || geteuid() != uid) {
160761efaa7SDag-Erling Smørgrav 		fatal("%s: euid incorrect uid:%u euid:%u (should be %u)",
161761efaa7SDag-Erling Smørgrav 		    __func__, (u_int)getuid(), (u_int)geteuid(), (u_int)uid);
162761efaa7SDag-Erling Smørgrav 	}
163761efaa7SDag-Erling Smørgrav }
164761efaa7SDag-Erling Smørgrav 
165511b41d2SMark Murray /*
1661e8db6e2SBrian Feldman  * Restores to the original (privileged) uid.
167511b41d2SMark Murray  */
168511b41d2SMark Murray void
1691e8db6e2SBrian Feldman restore_uid(void)
170511b41d2SMark Murray {
1711e8db6e2SBrian Feldman 	/* it's a no-op unless privileged */
1724b17dab0SDag-Erling Smørgrav 	if (!privileged) {
1734b17dab0SDag-Erling Smørgrav 		debug("restore_uid: (unprivileged)");
1741e8db6e2SBrian Feldman 		return;
1754b17dab0SDag-Erling Smørgrav 	}
1761e8db6e2SBrian Feldman 	if (!temporarily_use_uid_effective)
1771e8db6e2SBrian Feldman 		fatal("restore_uid: temporarily_use_uid not effective");
17883d2307dSDag-Erling Smørgrav 
17983d2307dSDag-Erling Smørgrav #ifdef SAVED_IDS_WORK_WITH_SETEUID
1804b17dab0SDag-Erling Smørgrav 	debug("restore_uid: %u/%u", (u_int)saved_euid, (u_int)saved_egid);
1811e8db6e2SBrian Feldman 	/* Set the effective uid back to the saved privileged uid. */
182511b41d2SMark Murray 	if (seteuid(saved_euid) < 0)
1831e8db6e2SBrian Feldman 		fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno));
1841e8db6e2SBrian Feldman 	if (setegid(saved_egid) < 0)
1851e8db6e2SBrian Feldman 		fatal("setegid %u: %.100s", (u_int)saved_egid, strerror(errno));
18683d2307dSDag-Erling Smørgrav #else /* SAVED_IDS_WORK_WITH_SETEUID */
18783d2307dSDag-Erling Smørgrav 	/*
18883d2307dSDag-Erling Smørgrav 	 * We are unable to restore the real uid to its unprivileged value.
18983d2307dSDag-Erling Smørgrav 	 * Propagate the real uid (usually more privileged) to effective uid
19083d2307dSDag-Erling Smørgrav 	 * as well.
19183d2307dSDag-Erling Smørgrav 	 */
19283d2307dSDag-Erling Smørgrav 	setuid(getuid());
19383d2307dSDag-Erling Smørgrav 	setgid(getgid());
19483d2307dSDag-Erling Smørgrav #endif /* SAVED_IDS_WORK_WITH_SETEUID */
19583d2307dSDag-Erling Smørgrav 
19683d2307dSDag-Erling Smørgrav 	if (setgroups(saved_egroupslen, saved_egroups) < 0)
19783d2307dSDag-Erling Smørgrav 		fatal("setgroups: %.100s", strerror(errno));
1981e8db6e2SBrian Feldman 	temporarily_use_uid_effective = 0;
199511b41d2SMark Murray }
200511b41d2SMark Murray 
201511b41d2SMark Murray /*
202511b41d2SMark Murray  * Permanently sets all uids to the given uid.  This cannot be
203511b41d2SMark Murray  * called while temporarily_use_uid is effective.
204511b41d2SMark Murray  */
205511b41d2SMark Murray void
2061e8db6e2SBrian Feldman permanently_set_uid(struct passwd *pw)
207511b41d2SMark Murray {
208*acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
209d95e11bfSDag-Erling Smørgrav 	uid_t old_uid = getuid();
210d95e11bfSDag-Erling Smørgrav 	gid_t old_gid = getgid();
211f7167e0eSDag-Erling Smørgrav #endif
212d95e11bfSDag-Erling Smørgrav 
213761efaa7SDag-Erling Smørgrav 	if (pw == NULL)
214761efaa7SDag-Erling Smørgrav 		fatal("permanently_set_uid: no user given");
2151e8db6e2SBrian Feldman 	if (temporarily_use_uid_effective)
216545d5ecaSDag-Erling Smørgrav 		fatal("permanently_set_uid: temporarily_use_uid effective");
2174b17dab0SDag-Erling Smørgrav 	debug("permanently_set_uid: %u/%u", (u_int)pw->pw_uid,
2184b17dab0SDag-Erling Smørgrav 	    (u_int)pw->pw_gid);
219d95e11bfSDag-Erling Smørgrav 
220d95e11bfSDag-Erling Smørgrav 	if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) < 0)
221d95e11bfSDag-Erling Smørgrav 		fatal("setresgid %u: %.100s", (u_int)pw->pw_gid, strerror(errno));
222d95e11bfSDag-Erling Smørgrav 
223cce7d346SDag-Erling Smørgrav #ifdef __APPLE__
224cce7d346SDag-Erling Smørgrav 	/*
225cce7d346SDag-Erling Smørgrav 	 * OS X requires initgroups after setgid to opt back into
226cce7d346SDag-Erling Smørgrav 	 * memberd support for >16 supplemental groups.
227cce7d346SDag-Erling Smørgrav 	 */
228cce7d346SDag-Erling Smørgrav 	if (initgroups(pw->pw_name, pw->pw_gid) < 0)
229cce7d346SDag-Erling Smørgrav 		fatal("initgroups %.100s %u: %.100s",
230cce7d346SDag-Erling Smørgrav 		    pw->pw_name, (u_int)pw->pw_gid, strerror(errno));
231cce7d346SDag-Erling Smørgrav #endif
232cce7d346SDag-Erling Smørgrav 
233d95e11bfSDag-Erling Smørgrav 	if (setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid) < 0)
234d95e11bfSDag-Erling Smørgrav 		fatal("setresuid %u: %.100s", (u_int)pw->pw_uid, strerror(errno));
235d95e11bfSDag-Erling Smørgrav 
236*acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
237d95e11bfSDag-Erling Smørgrav 	/* Try restoration of GID if changed (test clearing of saved gid) */
2385e8dbd04SDag-Erling Smørgrav 	if (old_gid != pw->pw_gid && pw->pw_uid != 0 &&
239d95e11bfSDag-Erling Smørgrav 	    (setgid(old_gid) != -1 || setegid(old_gid) != -1))
240d95e11bfSDag-Erling Smørgrav 		fatal("%s: was able to restore old [e]gid", __func__);
2415e8dbd04SDag-Erling Smørgrav #endif
242d95e11bfSDag-Erling Smørgrav 
243d95e11bfSDag-Erling Smørgrav 	/* Verify GID drop was successful */
244d95e11bfSDag-Erling Smørgrav 	if (getgid() != pw->pw_gid || getegid() != pw->pw_gid) {
245d95e11bfSDag-Erling Smørgrav 		fatal("%s: egid incorrect gid:%u egid:%u (should be %u)",
246d95e11bfSDag-Erling Smørgrav 		    __func__, (u_int)getgid(), (u_int)getegid(),
247d95e11bfSDag-Erling Smørgrav 		    (u_int)pw->pw_gid);
248d95e11bfSDag-Erling Smørgrav 	}
249d95e11bfSDag-Erling Smørgrav 
250*acc1a9efSDag-Erling Smørgrav #ifndef NO_UID_RESTORATION_TEST
251d95e11bfSDag-Erling Smørgrav 	/* Try restoration of UID if changed (test clearing of saved uid) */
252d95e11bfSDag-Erling Smørgrav 	if (old_uid != pw->pw_uid &&
253d95e11bfSDag-Erling Smørgrav 	    (setuid(old_uid) != -1 || seteuid(old_uid) != -1))
254d95e11bfSDag-Erling Smørgrav 		fatal("%s: was able to restore old [e]uid", __func__);
255d95e11bfSDag-Erling Smørgrav #endif
256d95e11bfSDag-Erling Smørgrav 
257d95e11bfSDag-Erling Smørgrav 	/* Verify UID drop was successful */
258d95e11bfSDag-Erling Smørgrav 	if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid) {
259d95e11bfSDag-Erling Smørgrav 		fatal("%s: euid incorrect uid:%u euid:%u (should be %u)",
260d95e11bfSDag-Erling Smørgrav 		    __func__, (u_int)getuid(), (u_int)geteuid(),
261d95e11bfSDag-Erling Smørgrav 		    (u_int)pw->pw_uid);
262d95e11bfSDag-Erling Smørgrav 	}
263511b41d2SMark Murray }
264