xref: /freebsd/lib/libpam/modules/pam_securetty/pam_securetty.c (revision 8c66575de8b53827b65ebb739b9d9dd073824790)
1 /*-
2  * Copyright (c) 2001 Mark R V Murray
3  * All rights reserved.
4  * Copyright (c) 2001 Networks Associates Technologies, Inc.
5  * All rights reserved.
6  *
7  * Portions of this software were developed for the FreeBSD Project by
8  * ThinkSec AS and NAI Labs, the Security Research Division of Network
9  * Associates, Inc.  under DARPA/SPAWAR contract N66001-01-C-8035
10  * ("CBOSS"), as part of the DARPA CHATS research program.
11  *
12  * Redistribution and use in source and binary forms, with or without
13  * modification, are permitted provided that the following conditions
14  * are met:
15  * 1. Redistributions of source code must retain the above copyright
16  *    notice, this list of conditions and the following disclaimer.
17  * 2. Redistributions in binary form must reproduce the above copyright
18  *    notice, this list of conditions and the following disclaimer in the
19  *    documentation and/or other materials provided with the distribution.
20  * 3. The name of the author may not be used to endorse or promote
21  *    products derived from this software without specific prior written
22  *    permission.
23  *
24  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
25  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
28  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34  * SUCH DAMAGE.
35  */
36 
37 #include <sys/cdefs.h>
38 __FBSDID("$FreeBSD$");
39 
40 #include <sys/types.h>
41 #include <sys/stat.h>
42 #include <pwd.h>
43 #include <ttyent.h>
44 #include <string.h>
45 
46 #define PAM_SM_AUTH
47 #define PAM_SM_ACCOUNT
48 #define PAM_SM_SESSION
49 #define PAM_SM_PASSWORD
50 
51 #include <security/pam_appl.h>
52 #include <security/pam_modules.h>
53 #include <security/pam_mod_misc.h>
54 
55 #define TTY_PREFIX	"/dev/"
56 
57 PAM_EXTERN int
58 pam_sm_authenticate(pam_handle_t *pamh __unused, int flags __unused, int argc, const char **argv)
59 {
60 	struct options options;
61 
62 	pam_std_option(&options, NULL, argc, argv);
63 
64 	PAM_LOG("Options processed");
65 
66 	PAM_RETURN(PAM_IGNORE);
67 }
68 
69 PAM_EXTERN
70 int
71 pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused, int argc, const char **argv)
72 {
73 	struct options options;
74 
75 	pam_std_option(&options, NULL, argc, argv);
76 
77 	PAM_LOG("Options processed");
78 
79 	PAM_RETURN(PAM_SUCCESS);
80 }
81 
82 PAM_EXTERN int
83 pam_sm_acct_mgmt(pam_handle_t *pamh __unused, int flags __unused, int argc ,const char **argv)
84 {
85 	struct options options;
86 	struct passwd *pwd;
87 	struct ttyent *ty;
88 	const char *user, *tty;
89 	int pam_err;
90 
91 	pam_std_option(&options, NULL, argc, argv);
92 
93 	PAM_LOG("Options processed");
94 
95 	pam_err = pam_get_user(pamh, &user, NULL);
96 	if (pam_err != PAM_SUCCESS)
97 		PAM_RETURN(pam_err);
98 	if (user == NULL || (pwd = getpwnam(user)) == NULL)
99 		PAM_RETURN(PAM_SERVICE_ERR);
100 
101 	PAM_LOG("Got user: %s", user);
102 
103 	/* If the user is not root, secure ttys do not apply */
104 	if (pwd->pw_uid != 0)
105 		PAM_RETURN(PAM_SUCCESS);
106 
107 	pam_err = pam_get_item(pamh, PAM_TTY, (const void **)&tty);
108 	if (pam_err != PAM_SUCCESS)
109 		PAM_RETURN(pam_err);
110 
111 	PAM_LOG("Got TTY: %s", tty);
112 
113 	/* Ignore any "/dev/" on the PAM_TTY item */
114 	if (tty != NULL && strncmp(TTY_PREFIX, tty, sizeof(TTY_PREFIX)) == 0) {
115 		PAM_LOG("WARNING: PAM_TTY starts with " TTY_PREFIX);
116 		tty += sizeof(TTY_PREFIX) - 1;
117 	}
118 
119 	if (tty != NULL && (ty = getttynam(tty)) != NULL &&
120 	    (ty->ty_status & TTY_SECURE) != 0)
121 		PAM_RETURN(PAM_SUCCESS);
122 
123 	PAM_VERBOSE_ERROR("Not on secure TTY");
124 	PAM_RETURN(PAM_AUTH_ERR);
125 }
126 
127 PAM_EXTERN int
128 pam_sm_chauthtok(pam_handle_t *pamh __unused, int flags __unused, int argc, const char **argv)
129 {
130 	struct options options;
131 
132 	pam_std_option(&options, NULL, argc, argv);
133 
134 	PAM_LOG("Options processed");
135 
136 	PAM_RETURN(PAM_IGNORE);
137 }
138 
139 PAM_EXTERN int
140 pam_sm_open_session(pam_handle_t *pamh __unused, int flags __unused, int argc, const char **argv)
141 {
142 	struct options options;
143 
144 	pam_std_option(&options, NULL, argc, argv);
145 
146 	PAM_LOG("Options processed");
147 
148 	PAM_RETURN(PAM_IGNORE);
149 }
150 
151 PAM_EXTERN int
152 pam_sm_close_session(pam_handle_t *pamh __unused, int flags __unused, int argc, const char **argv)
153 {
154 	struct options options;
155 
156 	pam_std_option(&options, NULL, argc, argv);
157 
158 	PAM_LOG("Options processed");
159 
160 	PAM_RETURN(PAM_IGNORE);
161 }
162 
163 PAM_MODULE_ENTRY("pam_securetty");
164