xref: /freebsd/lib/libypclnt/ypclnt_passwd.c (revision c744e7522179b2cd69f9ba832b76cfb3c246735e)
1 /*-
2  * Copyright (c) 2002 Networks Associates Technology, Inc.
3  * All rights reserved.
4  *
5  * This software was developed for the FreeBSD Project by ThinkSec AS and
6  * NAI Labs, the Security Research Division of Network Associates, Inc.
7  * under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
8  * DARPA CHATS research program.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. The name of the author may not be used to endorse or promote
19  *    products derived from this software without specific prior written
20  *    permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  *
34  * $FreeBSD$
35  */
36 
37 #include <sys/types.h>
38 #include <sys/socket.h>
39 #include <netinet/in.h>
40 
41 #include <err.h>
42 #include <errno.h>
43 #include <netconfig.h>
44 #include <netdb.h>
45 #include <pwd.h>
46 #include <stdlib.h>
47 #include <string.h>
48 #include <unistd.h>
49 
50 #include <rpcsvc/ypclnt.h>
51 #include <rpcsvc/yppasswd.h>
52 
53 #include "ypclnt.h"
54 #include "yppasswd_private.h"
55 
56 static int yppasswd_remote(ypclnt_t *, const struct passwd *, const char *);
57 static int yppasswd_local(ypclnt_t *, const struct passwd *, const char *);
58 
59 /*
60  * Determines the availability of rpc.yppasswdd.  Returns -1 for not
61  * available (or unable to determine), 0 for available, 1 for available in
62  * master mode.
63  */
64 int
65 ypclnt_havepasswdd(ypclnt_t *ypclnt)
66 {
67 	struct addrinfo hints, *res;
68 	int sd;
69 
70 	/* check that rpc.yppasswdd is running */
71 	if (getrpcport(ypclnt->server, YPPASSWDPROG,
72 		YPPASSWDPROC_UPDATE, IPPROTO_UDP) == 0) {
73 		ypclnt_error(ypclnt, __func__, "no rpc.yppasswdd on server");
74 		return (-1);
75 	}
76 
77 	/* if we're not root, use remote method */
78 	if (getuid() != 0)
79 		return (0);
80 
81 	/* try to determine if we are the server */
82 	memset(&hints, 0, sizeof(hints));
83 	hints.ai_family = AF_UNSPEC;
84 	hints.ai_socktype = SOCK_STREAM;
85 	hints.ai_protocol = 0;
86 	if (getaddrinfo(ypclnt->server, NULL, &hints, &res) != 0)
87 		return (0);
88 	sd = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
89 	if (sd == -1) {
90 		freeaddrinfo(res);
91 		return (0);
92 	}
93 	if (bind(sd, res->ai_addr, res->ai_addrlen) == -1) {
94 		close(sd);
95 		freeaddrinfo(res);
96 		return (0);
97 	}
98 	freeaddrinfo(res);
99 	close(sd);
100 	return (1);
101 }
102 
103 /*
104  * Updates the NIS user information for the specified user.
105  */
106 int
107 ypclnt_passwd(ypclnt_t *ypclnt, const struct passwd *pwd, const char *passwd)
108 {
109 	switch (ypclnt_havepasswdd(ypclnt)) {
110 	case 0:
111 		YPCLNT_DEBUG("using remote update method");
112 		return (yppasswd_remote(ypclnt, pwd, passwd));
113 	case 1:
114 		YPCLNT_DEBUG("using local update method");
115 		return (yppasswd_local(ypclnt, pwd, passwd));
116 	default:
117 		YPCLNT_DEBUG("no rpc.yppasswdd");
118 		return (-1);
119 	}
120 }
121 
122 /*
123  * yppasswd_remote and yppasswd_local are quite similar but still
124  * sufficiently different that merging them into one makes the code
125  * significantly less readable, IMHO, so we keep them separate.
126  */
127 
128 static int
129 yppasswd_local(ypclnt_t *ypclnt, const struct passwd *pwd, const char *passwd)
130 {
131 	struct master_yppasswd yppwd;
132 	struct rpc_err rpcerr;
133 	struct netconfig *nc = NULL;
134 	CLIENT *clnt = NULL;
135 	int ret, *result;
136 
137 	/* fill the master_yppasswd structure */
138 	memset(&yppwd, 0, sizeof yppwd);
139 	yppwd.newpw.pw_uid = pwd->pw_uid;
140 	yppwd.newpw.pw_gid = pwd->pw_gid;
141 	yppwd.newpw.pw_change = pwd->pw_change;
142 	yppwd.newpw.pw_expire = pwd->pw_expire;
143 	yppwd.newpw.pw_fields = pwd->pw_fields;
144 	if ((yppwd.newpw.pw_name = strdup(pwd->pw_name)) == NULL ||
145 	    (yppwd.newpw.pw_passwd = strdup(pwd->pw_passwd)) == NULL ||
146 	    (yppwd.newpw.pw_class = strdup(pwd->pw_class)) == NULL ||
147 	    (yppwd.newpw.pw_gecos = strdup(pwd->pw_gecos)) == NULL ||
148 	    (yppwd.newpw.pw_dir = strdup(pwd->pw_dir)) == NULL ||
149 	    (yppwd.newpw.pw_shell = strdup(pwd->pw_shell)) == NULL ||
150 	    (yppwd.oldpass = strdup(passwd ? passwd : "")) == NULL) {
151 		ypclnt_error(ypclnt, __func__, strerror(errno));
152 		ret = -1;
153 		goto done;
154 	}
155 
156 	/* connect to rpc.yppasswdd */
157 	nc = getnetconfigent("unix");
158 	clnt = clnt_tp_create(ypclnt->server, YPPASSWDPROG, YPPASSWDVERS, nc);
159 	if (clnt == NULL) {
160 		ypclnt_error(ypclnt, __func__,
161 		    "failed to connect to rpc.yppasswdd: %s",
162 		    clnt_spcreateerror(ypclnt->server));
163 		ret = -1;
164 		goto done;
165 	}
166 	clnt->cl_auth = authunix_create_default();
167 
168 	/* request the update */
169 	result = yppasswdproc_update_master_1(&yppwd, clnt);
170 
171 	/* check for RPC errors */
172 	clnt_geterr(clnt, &rpcerr);
173 	if (rpcerr.re_status != RPC_SUCCESS) {
174 		ypclnt_error(ypclnt, __func__,
175 		    "NIS password update failed: %s",
176 		    clnt_sperror(clnt, ypclnt->server));
177 		ret = -1;
178 		goto done;
179 	}
180 
181 	/* check the result of the update */
182 	if (result == NULL || *result != 0) {
183 		ypclnt_error(ypclnt, __func__,
184 		    "NIS password update failed");
185 		/* XXX how do we get more details? */
186 		ret = -1;
187 		goto done;
188 	}
189 
190 	ypclnt_error(ypclnt, NULL, NULL);
191 	ret = 0;
192 
193  done:
194 	if (clnt != NULL) {
195 		auth_destroy(clnt->cl_auth);
196 		clnt_destroy(clnt);
197 	}
198 	if (nc != NULL)
199 		freenetconfigent(nc);
200 	free(yppwd.newpw.pw_name);
201 	if (yppwd.newpw.pw_passwd != NULL) {
202 		memset(yppwd.newpw.pw_passwd, 0, strlen(yppwd.newpw.pw_passwd));
203 		free(yppwd.newpw.pw_passwd);
204 	}
205 	free(yppwd.newpw.pw_class);
206 	free(yppwd.newpw.pw_gecos);
207 	free(yppwd.newpw.pw_dir);
208 	free(yppwd.newpw.pw_shell);
209 	if (yppwd.oldpass != NULL) {
210 		memset(yppwd.oldpass, 0, strlen(yppwd.oldpass));
211 		free(yppwd.oldpass);
212 	}
213 	return (ret);
214 }
215 
216 static int
217 yppasswd_remote(ypclnt_t *ypclnt, const struct passwd *pwd, const char *passwd)
218 {
219 	struct yppasswd yppwd;
220 	struct rpc_err rpcerr;
221 	CLIENT *clnt = NULL;
222 	int ret, *result;
223 
224 	/* fill the yppasswd structure */
225 	memset(&yppwd, 0, sizeof yppwd);
226 	yppwd.newpw.pw_uid = pwd->pw_uid;
227 	yppwd.newpw.pw_gid = pwd->pw_gid;
228 	if ((yppwd.newpw.pw_name = strdup(pwd->pw_name)) == NULL ||
229 	    (yppwd.newpw.pw_passwd = strdup(pwd->pw_passwd)) == NULL ||
230 	    (yppwd.newpw.pw_gecos = strdup(pwd->pw_gecos)) == NULL ||
231 	    (yppwd.newpw.pw_dir = strdup(pwd->pw_dir)) == NULL ||
232 	    (yppwd.newpw.pw_shell = strdup(pwd->pw_shell)) == NULL ||
233 	    (yppwd.oldpass = strdup(passwd ? passwd : "")) == NULL) {
234 		ypclnt_error(ypclnt, __func__, strerror(errno));
235 		ret = -1;
236 		goto done;
237 	}
238 
239 	/* connect to rpc.yppasswdd */
240 	clnt = clnt_create(ypclnt->server, YPPASSWDPROG, YPPASSWDVERS, "udp");
241 	if (clnt == NULL) {
242 		ypclnt_error(ypclnt, __func__,
243 		    "failed to connect to rpc.yppasswdd: %s",
244 		    clnt_spcreateerror(ypclnt->server));
245 		ret = -1;
246 		goto done;
247 	}
248 	clnt->cl_auth = authunix_create_default();
249 
250 	/* request the update */
251 	result = yppasswdproc_update_1(&yppwd, clnt);
252 
253 	/* check for RPC errors */
254 	clnt_geterr(clnt, &rpcerr);
255 	if (rpcerr.re_status != RPC_SUCCESS) {
256 		ypclnt_error(ypclnt, __func__,
257 		    "NIS password update failed: %s",
258 		    clnt_sperror(clnt, ypclnt->server));
259 		ret = -1;
260 		goto done;
261 	}
262 
263 	/* check the result of the update */
264 	if (result == NULL || *result != 0) {
265 		ypclnt_error(ypclnt, __func__,
266 		    "NIS password update failed");
267 		/* XXX how do we get more details? */
268 		ret = -1;
269 		goto done;
270 	}
271 
272 	ypclnt_error(ypclnt, NULL, NULL);
273 	ret = 0;
274 
275  done:
276 	if (clnt != NULL) {
277 		auth_destroy(clnt->cl_auth);
278 		clnt_destroy(clnt);
279 	}
280 	free(yppwd.newpw.pw_name);
281 	if (yppwd.newpw.pw_passwd != NULL) {
282 		memset(yppwd.newpw.pw_passwd, 0, strlen(yppwd.newpw.pw_passwd));
283 		free(yppwd.newpw.pw_passwd);
284 	}
285 	free(yppwd.newpw.pw_gecos);
286 	free(yppwd.newpw.pw_dir);
287 	free(yppwd.newpw.pw_shell);
288 	if (yppwd.oldpass != NULL) {
289 		memset(yppwd.oldpass, 0, strlen(yppwd.oldpass));
290 		free(yppwd.oldpass);
291 	}
292 	return (ret);
293 }
294