1 /* 2 * Copyright (c) 1988, 1993, 1994 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #ifndef lint 35 static const char copyright[] = 36 "@(#) Copyright (c) 1988, 1993, 1994\n\ 37 The Regents of the University of California. All rights reserved.\n"; 38 #endif /* not lint */ 39 40 #ifndef lint 41 #if 0 42 static char sccsid[] = "@(#)su.c 8.3 (Berkeley) 4/2/94"; 43 #endif 44 static const char rcsid[] = 45 "$FreeBSD$"; 46 #endif /* not lint */ 47 48 #include <sys/param.h> 49 #include <sys/time.h> 50 #include <sys/resource.h> 51 #include <sys/wait.h> 52 53 #include <err.h> 54 #include <errno.h> 55 #include <grp.h> 56 #include <libutil.h> 57 #include <login_cap.h> 58 #include <paths.h> 59 #include <pwd.h> 60 #include <signal.h> 61 #include <stdio.h> 62 #include <stdlib.h> 63 #include <string.h> 64 #include <syslog.h> 65 #include <unistd.h> 66 67 #include <security/pam_appl.h> 68 #include <security/pam_misc.h> 69 70 #define PAM_END do { \ 71 int local_ret; \ 72 if (pamh != NULL && creds_set) { \ 73 local_ret = pam_setcred(pamh, PAM_DELETE_CRED); \ 74 if (local_ret != PAM_SUCCESS) \ 75 syslog(LOG_ERR, "pam_setcred: %s", \ 76 pam_strerror(pamh, local_ret)); \ 77 local_ret = pam_end(pamh, local_ret); \ 78 if (local_ret != PAM_SUCCESS) \ 79 syslog(LOG_ERR, "pam_end: %s", \ 80 pam_strerror(pamh, local_ret)); \ 81 } \ 82 } while (0) 83 84 85 #define PAM_SET_ITEM(what, item) do { \ 86 int local_ret; \ 87 local_ret = pam_set_item(pamh, what, item); \ 88 if (local_ret != PAM_SUCCESS) { \ 89 syslog(LOG_ERR, "pam_set_item(" #what "): %s", \ 90 pam_strerror(pamh, local_ret)); \ 91 errx(1, "pam_set_item(" #what "): %s", \ 92 pam_strerror(pamh, local_ret)); \ 93 } \ 94 } while (0) 95 96 #define ARGSTR "-flmc:" 97 98 enum tristate { UNSET, YES, NO }; 99 100 static pam_handle_t *pamh = NULL; 101 static int creds_set = 0; 102 static char **environ_pam; 103 104 static char *ontty(void); 105 static int chshell(char *); 106 static void usage(void); 107 static int export_pam_environment(void); 108 static int ok_to_export(const char *); 109 110 extern char **environ; 111 112 int 113 main(int argc, char *argv[]) 114 { 115 struct passwd *pwd; 116 struct pam_conv conv = {misc_conv, NULL}; 117 enum tristate iscsh; 118 login_cap_t *lc; 119 uid_t ruid; 120 gid_t gid; 121 int asme, ch, asthem, fastlogin, prio, i, setwhat, retcode, 122 statusp, child_pid, child_pgrp, ret_pid; 123 char *p, *user, *shell, *username, *cleanenv, **nargv, **np, 124 *class, *mytty, shellbuf[MAXPATHLEN], 125 myhost[MAXHOSTNAMELEN + 1]; 126 127 shell = class = cleanenv = NULL; 128 asme = asthem = fastlogin = statusp = 0; 129 user = "root"; 130 iscsh = UNSET; 131 132 while ((ch = getopt(argc, argv, ARGSTR)) != -1) 133 switch ((char)ch) { 134 case 'f': 135 fastlogin = 1; 136 break; 137 case '-': 138 case 'l': 139 asme = 0; 140 asthem = 1; 141 break; 142 case 'm': 143 asme = 1; 144 asthem = 0; 145 break; 146 case 'c': 147 class = optarg; 148 break; 149 case '?': 150 default: 151 usage(); 152 } 153 154 if (optind < argc) 155 user = argv[optind++]; 156 157 if (user == NULL) 158 usage(); 159 160 if (strlen(user) > MAXLOGNAME - 1) 161 errx(1, "username too long"); 162 163 nargv = malloc(sizeof(char *) * (argc + 4)); 164 if (nargv == NULL) 165 errx(1, "malloc failure"); 166 167 nargv[argc + 3] = NULL; 168 for (i = argc; i >= optind; i--) 169 nargv[i + 3] = argv[i]; 170 np = &nargv[i + 3]; 171 172 argv += optind; 173 174 errno = 0; 175 prio = getpriority(PRIO_PROCESS, 0); 176 if (errno) 177 prio = 0; 178 179 setpriority(PRIO_PROCESS, 0, -2); 180 openlog("su", LOG_CONS, LOG_AUTH); 181 182 /* get current login name, real uid and shell */ 183 ruid = getuid(); 184 username = getlogin(); 185 pwd = getpwnam(username); 186 if (username == NULL || pwd == NULL || pwd->pw_uid != ruid) 187 pwd = getpwuid(ruid); 188 if (pwd == NULL) 189 errx(1, "who are you?"); 190 gid = pwd->pw_gid; 191 192 username = strdup(pwd->pw_name); 193 if (username == NULL) 194 err(1, "strdup failure"); 195 196 if (asme) { 197 if (pwd->pw_shell != NULL && *pwd->pw_shell != '\0') { 198 /* must copy - pwd memory is recycled */ 199 shell = strncpy(shellbuf, pwd->pw_shell, 200 sizeof(shellbuf)); 201 shellbuf[sizeof(shellbuf) - 1] = '\0'; 202 } 203 else { 204 shell = _PATH_BSHELL; 205 iscsh = NO; 206 } 207 } 208 209 /* Do the whole PAM startup thing */ 210 retcode = pam_start("su", user, &conv, &pamh); 211 if (retcode != PAM_SUCCESS) { 212 syslog(LOG_ERR, "pam_start: %s", pam_strerror(pamh, retcode)); 213 errx(1, "pam_start: %s", pam_strerror(pamh, retcode)); 214 } 215 216 gethostname(myhost, sizeof(myhost)); 217 PAM_SET_ITEM(PAM_RHOST, myhost); 218 219 mytty = ttyname(STDERR_FILENO); 220 if (!mytty) 221 mytty = "tty"; 222 PAM_SET_ITEM(PAM_TTY, mytty); 223 224 retcode = pam_authenticate(pamh, 0); 225 if (retcode != PAM_SUCCESS) { 226 syslog(LOG_ERR, "pam_authenticate: %s", 227 pam_strerror(pamh, retcode)); 228 errx(1, "Sorry"); 229 } 230 retcode = pam_get_item(pamh, PAM_USER, (const void **)&p); 231 if (retcode == PAM_SUCCESS) 232 user = p; 233 else 234 syslog(LOG_ERR, "pam_get_item(PAM_USER): %s", 235 pam_strerror(pamh, retcode)); 236 237 retcode = pam_acct_mgmt(pamh, 0); 238 if (retcode == PAM_NEW_AUTHTOK_REQD) { 239 retcode = pam_chauthtok(pamh, 240 PAM_CHANGE_EXPIRED_AUTHTOK); 241 if (retcode != PAM_SUCCESS) { 242 syslog(LOG_ERR, "pam_chauthtok: %s", 243 pam_strerror(pamh, retcode)); 244 errx(1, "Sorry"); 245 } 246 } 247 if (retcode != PAM_SUCCESS) { 248 syslog(LOG_ERR, "pam_acct_mgmt: %s", 249 pam_strerror(pamh, retcode)); 250 errx(1, "Sorry"); 251 } 252 253 /* get target login information, default to root */ 254 pwd = getpwnam(user); 255 if (pwd == NULL) 256 errx(1, "unknown login: %s", user); 257 if (class == NULL) 258 lc = login_getpwclass(pwd); 259 else { 260 if (ruid != 0) 261 errx(1, "only root may use -c"); 262 lc = login_getclass(class); 263 if (lc == NULL) 264 errx(1, "unknown class: %s", class); 265 } 266 267 /* if asme and non-standard target shell, must be root */ 268 if (asme) { 269 if (ruid != 0 && !chshell(pwd->pw_shell)) 270 errx(1, "permission denied (shell)."); 271 } 272 else if (pwd->pw_shell && *pwd->pw_shell) { 273 shell = pwd->pw_shell; 274 iscsh = UNSET; 275 } 276 else { 277 shell = _PATH_BSHELL; 278 iscsh = NO; 279 } 280 281 /* if we're forking a csh, we want to slightly muck the args */ 282 if (iscsh == UNSET) { 283 p = strrchr(shell, '/'); 284 if (p) 285 ++p; 286 else 287 p = shell; 288 iscsh = strcmp(p, "csh") ? (strcmp(p, "tcsh") ? NO : YES) : YES; 289 } 290 setpriority(PRIO_PROCESS, 0, prio); 291 292 /* 293 * PAM modules might add supplementary groups in pam_setcred(), so 294 * initialize them first. 295 */ 296 if (setusercontext(lc, pwd, pwd->pw_uid, LOGIN_SETGROUP) < 0) 297 err(1, "setusercontext"); 298 299 retcode = pam_setcred(pamh, PAM_ESTABLISH_CRED); 300 if (retcode != PAM_SUCCESS) 301 syslog(LOG_ERR, "pam_setcred(pamh, PAM_ESTABLISH_CRED): %s", 302 pam_strerror(pamh, retcode)); 303 else 304 creds_set = 1; 305 306 /* 307 * We must fork() before setuid() because we need to call 308 * pam_setcred(pamh, PAM_DELETE_CRED) as root. 309 */ 310 311 statusp = 1; 312 child_pid = fork(); 313 switch (child_pid) { 314 default: 315 while ((ret_pid = waitpid(child_pid, &statusp, WUNTRACED)) != -1) { 316 if (WIFSTOPPED(statusp)) { 317 child_pgrp = tcgetpgrp(1); 318 kill(getpid(), SIGSTOP); 319 tcsetpgrp(1, child_pgrp); 320 kill(child_pid, SIGCONT); 321 statusp = 1; 322 continue; 323 } 324 break; 325 } 326 if (ret_pid == -1) 327 err(1, "waitpid"); 328 PAM_END; 329 exit(statusp); 330 case -1: 331 err(1, "fork"); 332 PAM_END; 333 exit(1); 334 case 0: 335 /* 336 * Set all user context except for: Environmental variables 337 * Umask Login records (wtmp, etc) Path 338 */ 339 setwhat = LOGIN_SETALL & ~(LOGIN_SETENV | LOGIN_SETUMASK | 340 LOGIN_SETLOGIN | LOGIN_SETPATH | LOGIN_SETGROUP); 341 /* 342 * Don't touch resource/priority settings if -m has been used 343 * or -l and -c hasn't, and we're not su'ing to root. 344 */ 345 if ((asme || (!asthem && class == NULL)) && pwd->pw_uid) 346 setwhat &= ~(LOGIN_SETPRIORITY | LOGIN_SETRESOURCES); 347 if (setusercontext(lc, pwd, pwd->pw_uid, setwhat) < 0) 348 err(1, "setusercontext"); 349 350 if (!asme) { 351 if (asthem) { 352 p = getenv("TERM"); 353 environ = &cleanenv; 354 355 /* 356 * Add any environmental variables that the 357 * PAM modules may have set. 358 */ 359 environ_pam = pam_getenvlist(pamh); 360 if (environ_pam) 361 export_pam_environment(); 362 363 /* set the su'd user's environment & umask */ 364 setusercontext(lc, pwd, pwd->pw_uid, 365 LOGIN_SETPATH | LOGIN_SETUMASK | 366 LOGIN_SETENV); 367 if (p) 368 setenv("TERM", p, 1); 369 if (chdir(pwd->pw_dir) < 0) 370 errx(1, "no directory"); 371 } 372 if (asthem || pwd->pw_uid) 373 setenv("USER", pwd->pw_name, 1); 374 setenv("HOME", pwd->pw_dir, 1); 375 setenv("SHELL", shell, 1); 376 } 377 login_close(lc); 378 379 if (iscsh == YES) { 380 if (fastlogin) 381 *np-- = "-f"; 382 if (asme) 383 *np-- = "-m"; 384 } 385 /* csh strips the first character... */ 386 *np = asthem ? "-su" : iscsh == YES ? "_su" : "su"; 387 388 if (ruid != 0) 389 syslog(LOG_NOTICE, "%s to %s%s", username, user, 390 ontty()); 391 392 execv(shell, np); 393 err(1, "%s", shell); 394 } 395 } 396 397 static int 398 export_pam_environment(void) 399 { 400 char **pp; 401 402 for (pp = environ_pam; *pp != NULL; pp++) { 403 if (ok_to_export(*pp)) 404 putenv(*pp); 405 free(*pp); 406 } 407 return PAM_SUCCESS; 408 } 409 410 /* 411 * Sanity checks on PAM environmental variables: 412 * - Make sure there is an '=' in the string. 413 * - Make sure the string doesn't run on too long. 414 * - Do not export certain variables. This list was taken from the 415 * Solaris pam_putenv(3) man page. 416 */ 417 static int 418 ok_to_export(const char *s) 419 { 420 static const char *noexport[] = { 421 "SHELL", "HOME", "LOGNAME", "MAIL", "CDPATH", 422 "IFS", "PATH", NULL 423 }; 424 const char **pp; 425 size_t n; 426 427 if (strlen(s) > 1024 || strchr(s, '=') == NULL) 428 return 0; 429 if (strncmp(s, "LD_", 3) == 0) 430 return 0; 431 for (pp = noexport; *pp != NULL; pp++) { 432 n = strlen(*pp); 433 if (s[n] == '=' && strncmp(s, *pp, n) == 0) 434 return 0; 435 } 436 return 1; 437 } 438 439 static void 440 usage(void) 441 { 442 errx(1, "usage: su [%s] [login [args]]", ARGSTR); 443 } 444 445 static int 446 chshell(char *sh) 447 { 448 int r; 449 char *cp; 450 451 r = 0; 452 setusershell(); 453 do { 454 cp = getusershell(); 455 r = strcmp(cp, sh); 456 } while (!r && cp != NULL); 457 endusershell(); 458 return r; 459 } 460 461 static char * 462 ontty(void) 463 { 464 char *p; 465 static char buf[MAXPATHLEN + 4]; 466 467 buf[0] = 0; 468 p = ttyname(STDERR_FILENO); 469 if (p) 470 snprintf(buf, sizeof(buf), " on %s", p); 471 return buf; 472 } 473