17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate * CDDL HEADER START
37c478bd9Sstevel@tonic-gate *
47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the
57d080b24Sas145665 * Common Development and Distribution License (the "License").
67d080b24Sas145665 * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate *
87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate * and limitations under the License.
127c478bd9Sstevel@tonic-gate *
137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate *
197c478bd9Sstevel@tonic-gate * CDDL HEADER END
207c478bd9Sstevel@tonic-gate */
21aecfc01dSrui zang - Sun Microsystems - Beijing China
227c478bd9Sstevel@tonic-gate /*
23de81e71eSTim Marsland * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
247c478bd9Sstevel@tonic-gate * Use is subject to license terms.
257c478bd9Sstevel@tonic-gate */
267c478bd9Sstevel@tonic-gate
277c478bd9Sstevel@tonic-gate /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */
287c478bd9Sstevel@tonic-gate /* All Rights Reserved */
297c478bd9Sstevel@tonic-gate
307c478bd9Sstevel@tonic-gate /*
317c478bd9Sstevel@tonic-gate * University Copyright- Copyright (c) 1982, 1986, 1988
327c478bd9Sstevel@tonic-gate * The Regents of the University of California
337c478bd9Sstevel@tonic-gate * All Rights Reserved
347c478bd9Sstevel@tonic-gate *
357c478bd9Sstevel@tonic-gate * University Acknowledgment- Portions of this document are derived from
367c478bd9Sstevel@tonic-gate * software developed by the University of California, Berkeley, and its
377c478bd9Sstevel@tonic-gate * contributors.
387c478bd9Sstevel@tonic-gate */
397c478bd9Sstevel@tonic-gate
407c478bd9Sstevel@tonic-gate /* Copyright (c) 1987, 1988 Microsoft Corporation */
417c478bd9Sstevel@tonic-gate /* All Rights Reserved */
427c478bd9Sstevel@tonic-gate
437c478bd9Sstevel@tonic-gate /*
447c478bd9Sstevel@tonic-gate * For a complete reference to login(1), see the manual page. However,
457c478bd9Sstevel@tonic-gate * login has accreted some intentionally undocumented options, which are
467c478bd9Sstevel@tonic-gate * explained here:
477c478bd9Sstevel@tonic-gate *
487c478bd9Sstevel@tonic-gate * -a: This legacy flag appears to be unused.
497c478bd9Sstevel@tonic-gate *
507c478bd9Sstevel@tonic-gate * -f <username>: This flag was introduced by PSARC 1995/039 in support
517c478bd9Sstevel@tonic-gate * of Kerberos. But it's not used by Sun's Kerberos implementation.
527c478bd9Sstevel@tonic-gate * It is however employed by zlogin(1), since it allows one to tell
537c478bd9Sstevel@tonic-gate * login: "This user is authenticated." In the case of zlogin that's
547c478bd9Sstevel@tonic-gate * true because the zone always trusts the global zone.
557c478bd9Sstevel@tonic-gate *
567c478bd9Sstevel@tonic-gate * -z <zonename>: This flag is passed to login when zlogin(1) executes a
577c478bd9Sstevel@tonic-gate * zone login. This tells login(1) to skip it's normal CONSOLE check
587c478bd9Sstevel@tonic-gate * (i.e. that the root login must be on /dev/console) and tells us the
59da6c28aaSamw * name of the zone from which the login is occurring.
607c478bd9Sstevel@tonic-gate */
617c478bd9Sstevel@tonic-gate
627c478bd9Sstevel@tonic-gate #include <sys/types.h>
637c478bd9Sstevel@tonic-gate #include <sys/param.h>
647c478bd9Sstevel@tonic-gate #include <unistd.h> /* For logfile locking */
657c478bd9Sstevel@tonic-gate #include <signal.h>
667c478bd9Sstevel@tonic-gate #include <stdio.h>
677c478bd9Sstevel@tonic-gate #include <sys/stat.h>
687c478bd9Sstevel@tonic-gate #include <string.h>
697c478bd9Sstevel@tonic-gate #include <deflt.h>
707c478bd9Sstevel@tonic-gate #include <grp.h>
717c478bd9Sstevel@tonic-gate #include <fcntl.h>
727c478bd9Sstevel@tonic-gate #include <lastlog.h>
737c478bd9Sstevel@tonic-gate #include <termio.h>
747c478bd9Sstevel@tonic-gate #include <utmpx.h>
757c478bd9Sstevel@tonic-gate #include <stdlib.h>
767c478bd9Sstevel@tonic-gate #include <wait.h>
777c478bd9Sstevel@tonic-gate #include <errno.h>
787c478bd9Sstevel@tonic-gate #include <ctype.h>
797c478bd9Sstevel@tonic-gate #include <syslog.h>
807c478bd9Sstevel@tonic-gate #include <ulimit.h>
817c478bd9Sstevel@tonic-gate #include <libgen.h>
827c478bd9Sstevel@tonic-gate #include <pwd.h>
837c478bd9Sstevel@tonic-gate #include <security/pam_appl.h>
847c478bd9Sstevel@tonic-gate #include <strings.h>
857c478bd9Sstevel@tonic-gate #include <libdevinfo.h>
867c478bd9Sstevel@tonic-gate #include <zone.h>
877c478bd9Sstevel@tonic-gate #include "login_audit.h"
887c478bd9Sstevel@tonic-gate
897c478bd9Sstevel@tonic-gate #include <krb5_repository.h>
907c478bd9Sstevel@tonic-gate /*
917c478bd9Sstevel@tonic-gate *
927c478bd9Sstevel@tonic-gate * *** Defines, Macros, and String Constants ***
937c478bd9Sstevel@tonic-gate *
947c478bd9Sstevel@tonic-gate *
957c478bd9Sstevel@tonic-gate */
967c478bd9Sstevel@tonic-gate
977c478bd9Sstevel@tonic-gate #define ISSUEFILE "/etc/issue" /* file to print before prompt */
987c478bd9Sstevel@tonic-gate #define NOLOGIN "/etc/nologin" /* file to lock users out during shutdown */
997c478bd9Sstevel@tonic-gate
1007c478bd9Sstevel@tonic-gate /*
1017c478bd9Sstevel@tonic-gate * These need to be defined for UTMPX management.
1027c478bd9Sstevel@tonic-gate * If we add in the utility functions later, we
1037c478bd9Sstevel@tonic-gate * can remove them.
1047c478bd9Sstevel@tonic-gate */
1057c478bd9Sstevel@tonic-gate #define __UPDATE_ENTRY 1
1067c478bd9Sstevel@tonic-gate #define __LOGIN 2
1077c478bd9Sstevel@tonic-gate
1087c478bd9Sstevel@tonic-gate /*
1097c478bd9Sstevel@tonic-gate * Intervals to sleep after failed login
1107c478bd9Sstevel@tonic-gate */
1117c478bd9Sstevel@tonic-gate #ifndef SLEEPTIME
1127c478bd9Sstevel@tonic-gate #define SLEEPTIME 4 /* sleeptime before login incorrect msg */
1137c478bd9Sstevel@tonic-gate #endif
1147c478bd9Sstevel@tonic-gate static int Sleeptime = SLEEPTIME;
1157c478bd9Sstevel@tonic-gate
1167c478bd9Sstevel@tonic-gate /*
1177c478bd9Sstevel@tonic-gate * seconds login disabled after allowable number of unsuccessful attempts
1187c478bd9Sstevel@tonic-gate */
1197c478bd9Sstevel@tonic-gate #ifndef DISABLETIME
1207c478bd9Sstevel@tonic-gate #define DISABLETIME 20
1217c478bd9Sstevel@tonic-gate #endif
1227c478bd9Sstevel@tonic-gate static int Disabletime = DISABLETIME;
1237c478bd9Sstevel@tonic-gate
1247c478bd9Sstevel@tonic-gate #define MAXTRYS 5
1257c478bd9Sstevel@tonic-gate
1267c478bd9Sstevel@tonic-gate static int retry = MAXTRYS;
1277c478bd9Sstevel@tonic-gate
1287c478bd9Sstevel@tonic-gate /*
1297c478bd9Sstevel@tonic-gate * Login logging support
1307c478bd9Sstevel@tonic-gate */
1317c478bd9Sstevel@tonic-gate #define LOGINLOG "/var/adm/loginlog" /* login log file */
1327c478bd9Sstevel@tonic-gate #define LNAME_SIZE 20 /* size of logged logname */
1337c478bd9Sstevel@tonic-gate #define TTYN_SIZE 15 /* size of logged tty name */
1347c478bd9Sstevel@tonic-gate #define TIME_SIZE 30 /* size of logged time string */
1357c478bd9Sstevel@tonic-gate #define ENT_SIZE (LNAME_SIZE + TTYN_SIZE + TIME_SIZE + 3)
1367c478bd9Sstevel@tonic-gate #define L_WAITTIME 5 /* waittime for log file to unlock */
1377c478bd9Sstevel@tonic-gate #define LOGTRYS 10 /* depth of 'try' logging */
1387c478bd9Sstevel@tonic-gate
1397c478bd9Sstevel@tonic-gate /*
1407c478bd9Sstevel@tonic-gate * String manipulation macros: SCPYN, SCPYL, EQN and ENVSTRNCAT
1417c478bd9Sstevel@tonic-gate * SCPYL is the safer version of SCPYN
1427c478bd9Sstevel@tonic-gate */
1437c478bd9Sstevel@tonic-gate #define SCPYL(a, b) (void) strlcpy(a, b, sizeof (a))
1447c478bd9Sstevel@tonic-gate #define SCPYN(a, b) (void) strncpy(a, b, sizeof (a))
1457c478bd9Sstevel@tonic-gate #define EQN(a, b) (strncmp(a, b, sizeof (a)-1) == 0)
1467c478bd9Sstevel@tonic-gate #define ENVSTRNCAT(to, from) {int deflen; deflen = strlen(to); \
1477c478bd9Sstevel@tonic-gate (void) strncpy((to)+ deflen, (from), sizeof (to) - (1 + deflen)); }
1487c478bd9Sstevel@tonic-gate
1497c478bd9Sstevel@tonic-gate /*
1507c478bd9Sstevel@tonic-gate * Other macros
1517c478bd9Sstevel@tonic-gate */
1527c478bd9Sstevel@tonic-gate #define NMAX sizeof (((struct utmpx *)0)->ut_name)
1537c478bd9Sstevel@tonic-gate #define HMAX sizeof (((struct utmpx *)0)->ut_host)
1547c478bd9Sstevel@tonic-gate #define min(a, b) (((a) < (b)) ? (a) : (b))
1557c478bd9Sstevel@tonic-gate
1567c478bd9Sstevel@tonic-gate /*
1577c478bd9Sstevel@tonic-gate * Various useful files and string constants
1587c478bd9Sstevel@tonic-gate */
1597c478bd9Sstevel@tonic-gate #define SHELL "/usr/bin/sh"
1607c478bd9Sstevel@tonic-gate #define SHELL2 "/sbin/sh"
1617c478bd9Sstevel@tonic-gate #define SUBLOGIN "<!sublogin>"
1627c478bd9Sstevel@tonic-gate #define LASTLOG "/var/adm/lastlog"
1637c478bd9Sstevel@tonic-gate #define PROG_NAME "login"
1647c478bd9Sstevel@tonic-gate #define HUSHLOGIN ".hushlogin"
1657c478bd9Sstevel@tonic-gate
1667c478bd9Sstevel@tonic-gate /*
1677c478bd9Sstevel@tonic-gate * Array and Buffer sizes
1687c478bd9Sstevel@tonic-gate */
1697c478bd9Sstevel@tonic-gate #define PBUFSIZE 8 /* max significant characters in a password */
1707c478bd9Sstevel@tonic-gate #define MAXARGS 63 /* change value below if changing this */
1717c478bd9Sstevel@tonic-gate #define MAXARGSWIDTH 2 /* log10(MAXARGS) */
1727c478bd9Sstevel@tonic-gate #define MAXENV 1024
1737c478bd9Sstevel@tonic-gate #define MAXLINE 2048
1747c478bd9Sstevel@tonic-gate
1757c478bd9Sstevel@tonic-gate /*
1767c478bd9Sstevel@tonic-gate * Miscellaneous constants
1777c478bd9Sstevel@tonic-gate */
1787c478bd9Sstevel@tonic-gate #define ROOTUID 0
1797c478bd9Sstevel@tonic-gate #define ERROR 1
1807c478bd9Sstevel@tonic-gate #define OK 0
1817c478bd9Sstevel@tonic-gate #define LOG_ERROR 1
1827c478bd9Sstevel@tonic-gate #define DONT_LOG_ERROR 0
1837c478bd9Sstevel@tonic-gate #define TRUE 1
1847c478bd9Sstevel@tonic-gate #define FALSE 0
1857c478bd9Sstevel@tonic-gate
1867c478bd9Sstevel@tonic-gate /*
1877c478bd9Sstevel@tonic-gate * Counters for counting the number of failed login attempts
1887c478bd9Sstevel@tonic-gate */
1897c478bd9Sstevel@tonic-gate static int trys = 0;
1907c478bd9Sstevel@tonic-gate static int count = 1;
1917c478bd9Sstevel@tonic-gate
1927c478bd9Sstevel@tonic-gate /*
1937c478bd9Sstevel@tonic-gate * error value for login_exit() audit output (0 == no audit record)
1947c478bd9Sstevel@tonic-gate */
1957c478bd9Sstevel@tonic-gate static int audit_error = 0;
1967c478bd9Sstevel@tonic-gate
1977c478bd9Sstevel@tonic-gate /*
1987c478bd9Sstevel@tonic-gate * Externs a plenty
1997c478bd9Sstevel@tonic-gate */
2007c478bd9Sstevel@tonic-gate extern int getsecretkey();
2017c478bd9Sstevel@tonic-gate
2027c478bd9Sstevel@tonic-gate /*
2037c478bd9Sstevel@tonic-gate * The current user name
2047c478bd9Sstevel@tonic-gate */
2057c478bd9Sstevel@tonic-gate static char user_name[NMAX];
2067c478bd9Sstevel@tonic-gate static char minusnam[16] = "-";
2077c478bd9Sstevel@tonic-gate
2087c478bd9Sstevel@tonic-gate /*
209f0243e0aSrz201010 * login_pid, used to find utmpx entry to update.
210f0243e0aSrz201010 */
211f0243e0aSrz201010 static pid_t login_pid;
212f0243e0aSrz201010
213f0243e0aSrz201010 /*
2147c478bd9Sstevel@tonic-gate * locale environments to be passed to shells.
2157c478bd9Sstevel@tonic-gate */
2167c478bd9Sstevel@tonic-gate static char *localeenv[] = {
2177c478bd9Sstevel@tonic-gate "LANG",
2187c478bd9Sstevel@tonic-gate "LC_CTYPE", "LC_NUMERIC", "LC_TIME", "LC_COLLATE",
2197c478bd9Sstevel@tonic-gate "LC_MONETARY", "LC_MESSAGES", "LC_ALL", 0};
2207c478bd9Sstevel@tonic-gate static int locale_envmatch(char *, char *);
2217c478bd9Sstevel@tonic-gate
2227c478bd9Sstevel@tonic-gate /*
2237c478bd9Sstevel@tonic-gate * Environment variable support
2247c478bd9Sstevel@tonic-gate */
2257c478bd9Sstevel@tonic-gate static char shell[256] = { "SHELL=" };
2267c478bd9Sstevel@tonic-gate static char home[MAXPATHLEN] = { "HOME=" };
2277c478bd9Sstevel@tonic-gate static char term[64] = { "TERM=" };
2287c478bd9Sstevel@tonic-gate static char logname[30] = { "LOGNAME=" };
2297c478bd9Sstevel@tonic-gate static char timez[100] = { "TZ=" };
2307c478bd9Sstevel@tonic-gate static char hertz[10] = { "HZ=" };
2317c478bd9Sstevel@tonic-gate static char path[MAXPATHLEN] = { "PATH=" };
2327c478bd9Sstevel@tonic-gate static char *newenv[10+MAXARGS] =
2337c478bd9Sstevel@tonic-gate {home, path, logname, hertz, term, 0, 0};
2347c478bd9Sstevel@tonic-gate static char **envinit = newenv;
2357c478bd9Sstevel@tonic-gate static int basicenv;
2367c478bd9Sstevel@tonic-gate static char *zero = (char *)0;
2377c478bd9Sstevel@tonic-gate static char **envp;
2387c478bd9Sstevel@tonic-gate #ifndef NO_MAIL
2397c478bd9Sstevel@tonic-gate static char mail[30] = { "MAIL=/var/mail/" };
2407c478bd9Sstevel@tonic-gate #endif
2417c478bd9Sstevel@tonic-gate extern char **environ;
2427c478bd9Sstevel@tonic-gate static char inputline[MAXLINE];
2437c478bd9Sstevel@tonic-gate
2447c478bd9Sstevel@tonic-gate #define MAX_ID_LEN 256
2457c478bd9Sstevel@tonic-gate #define MAX_REPOSITORY_LEN 256
2467c478bd9Sstevel@tonic-gate #define MAX_PAMSERVICE_LEN 256
2477c478bd9Sstevel@tonic-gate
2487c478bd9Sstevel@tonic-gate static char identity[MAX_ID_LEN];
2497c478bd9Sstevel@tonic-gate static char repository[MAX_REPOSITORY_LEN];
2507c478bd9Sstevel@tonic-gate static char progname[MAX_PAMSERVICE_LEN];
2517c478bd9Sstevel@tonic-gate
2527c478bd9Sstevel@tonic-gate
2537c478bd9Sstevel@tonic-gate /*
2547c478bd9Sstevel@tonic-gate * Strings used to prompt the user.
2557c478bd9Sstevel@tonic-gate */
2567c478bd9Sstevel@tonic-gate static char loginmsg[] = "login: ";
2577c478bd9Sstevel@tonic-gate static char passwdmsg[] = "Password:";
2587c478bd9Sstevel@tonic-gate static char incorrectmsg[] = "Login incorrect\n";
2597c478bd9Sstevel@tonic-gate
2607c478bd9Sstevel@tonic-gate /*
2617c478bd9Sstevel@tonic-gate * Password file support
2627c478bd9Sstevel@tonic-gate */
2637c478bd9Sstevel@tonic-gate static struct passwd *pwd = NULL;
2647c478bd9Sstevel@tonic-gate static char remote_host[HMAX];
2657c478bd9Sstevel@tonic-gate static char zone_name[ZONENAME_MAX];
2667c478bd9Sstevel@tonic-gate
2677c478bd9Sstevel@tonic-gate /*
2687c478bd9Sstevel@tonic-gate * Illegal passwd entries.
2697c478bd9Sstevel@tonic-gate */
270f48205beScasper static struct passwd nouser = { "", "no:password", (uid_t)-1 };
2717c478bd9Sstevel@tonic-gate
2727c478bd9Sstevel@tonic-gate /*
2737c478bd9Sstevel@tonic-gate * Log file support
2747c478bd9Sstevel@tonic-gate */
2757c478bd9Sstevel@tonic-gate static char *log_entry[LOGTRYS];
2767c478bd9Sstevel@tonic-gate static int writelog = 0;
2777c478bd9Sstevel@tonic-gate static int lastlogok = 0;
2787c478bd9Sstevel@tonic-gate static struct lastlog ll;
2797c478bd9Sstevel@tonic-gate static int dosyslog = 0;
2807c478bd9Sstevel@tonic-gate static int flogin = MAXTRYS; /* flag for SYSLOG_FAILED_LOGINS */
2817c478bd9Sstevel@tonic-gate
2827c478bd9Sstevel@tonic-gate /*
2837c478bd9Sstevel@tonic-gate * Default file toggles
2847c478bd9Sstevel@tonic-gate */
2857c478bd9Sstevel@tonic-gate static char *Pndefault = "/etc/default/login";
2867c478bd9Sstevel@tonic-gate static char *Altshell = NULL;
2877c478bd9Sstevel@tonic-gate static char *Console = NULL;
2887c478bd9Sstevel@tonic-gate static int Passreqflag = 0;
2897c478bd9Sstevel@tonic-gate
2907c478bd9Sstevel@tonic-gate #define DEFUMASK 022
2917c478bd9Sstevel@tonic-gate static mode_t Umask = DEFUMASK;
2927c478bd9Sstevel@tonic-gate static char *Def_tz = NULL;
2937c478bd9Sstevel@tonic-gate static char *tmp_tz = NULL;
2947c478bd9Sstevel@tonic-gate static char *Def_hertz = NULL;
2957c478bd9Sstevel@tonic-gate #define SET_FSIZ 2 /* ulimit() command arg */
2967c478bd9Sstevel@tonic-gate static long Def_ulimit = 0;
2977c478bd9Sstevel@tonic-gate #define MAX_TIMEOUT (15 * 60)
2987c478bd9Sstevel@tonic-gate #define DEF_TIMEOUT (5 * 60)
2997c478bd9Sstevel@tonic-gate static unsigned Def_timeout = DEF_TIMEOUT;
3007c478bd9Sstevel@tonic-gate static char *Def_path = NULL;
3017c478bd9Sstevel@tonic-gate static char *Def_supath = NULL;
3027c478bd9Sstevel@tonic-gate #define DEF_PATH "/usr/bin:" /* same as PATH */
3037c478bd9Sstevel@tonic-gate #define DEF_SUPATH "/usr/sbin:/usr/bin" /* same as ROOTPATH */
3047c478bd9Sstevel@tonic-gate
3057c478bd9Sstevel@tonic-gate /*
3067c478bd9Sstevel@tonic-gate * Defaults for updating expired passwords
3077c478bd9Sstevel@tonic-gate */
3087c478bd9Sstevel@tonic-gate #define DEF_ATTEMPTS 3
3097c478bd9Sstevel@tonic-gate
3107c478bd9Sstevel@tonic-gate /*
3117c478bd9Sstevel@tonic-gate * ttyprompt will point to the environment variable TTYPROMPT.
3127c478bd9Sstevel@tonic-gate * TTYPROMPT is set by ttymon if ttymon already wrote out the prompt.
3137c478bd9Sstevel@tonic-gate */
3147c478bd9Sstevel@tonic-gate static char *ttyprompt = NULL;
3157c478bd9Sstevel@tonic-gate static char *ttyn = NULL;
3167c478bd9Sstevel@tonic-gate
3177c478bd9Sstevel@tonic-gate /*
3187c478bd9Sstevel@tonic-gate * Pass inherited environment. Used by telnetd in support of the telnet
3197c478bd9Sstevel@tonic-gate * ENVIRON option.
3207c478bd9Sstevel@tonic-gate */
3217c478bd9Sstevel@tonic-gate static boolean_t pflag = B_FALSE;
3227c478bd9Sstevel@tonic-gate static boolean_t uflag = B_FALSE;
3237c478bd9Sstevel@tonic-gate static boolean_t Rflag = B_FALSE;
3247c478bd9Sstevel@tonic-gate static boolean_t sflag = B_FALSE;
3257c478bd9Sstevel@tonic-gate static boolean_t Uflag = B_FALSE;
3267c478bd9Sstevel@tonic-gate static boolean_t tflag = B_FALSE;
3277c478bd9Sstevel@tonic-gate static boolean_t hflag = B_FALSE;
3287c478bd9Sstevel@tonic-gate static boolean_t rflag = B_FALSE;
3297c478bd9Sstevel@tonic-gate static boolean_t zflag = B_FALSE;
3307c478bd9Sstevel@tonic-gate
3317c478bd9Sstevel@tonic-gate /*
3327c478bd9Sstevel@tonic-gate * Remote login support
3337c478bd9Sstevel@tonic-gate */
3347c478bd9Sstevel@tonic-gate static char rusername[NMAX+1], lusername[NMAX+1];
3357c478bd9Sstevel@tonic-gate static char terminal[MAXPATHLEN];
3367c478bd9Sstevel@tonic-gate
3377c478bd9Sstevel@tonic-gate /*
3387c478bd9Sstevel@tonic-gate * Pre-authentication flag support
3397c478bd9Sstevel@tonic-gate */
3407c478bd9Sstevel@tonic-gate static int fflag;
3417c478bd9Sstevel@tonic-gate
3427c478bd9Sstevel@tonic-gate static char ** getargs(char *);
3437c478bd9Sstevel@tonic-gate
3447c478bd9Sstevel@tonic-gate static int login_conv(int, struct pam_message **,
3457c478bd9Sstevel@tonic-gate struct pam_response **, void *);
3467c478bd9Sstevel@tonic-gate
3477c478bd9Sstevel@tonic-gate static struct pam_conv pam_conv = {login_conv, NULL};
3487c478bd9Sstevel@tonic-gate static pam_handle_t *pamh; /* Authentication handle */
3497c478bd9Sstevel@tonic-gate
3507c478bd9Sstevel@tonic-gate /*
3517c478bd9Sstevel@tonic-gate * Function declarations
3527c478bd9Sstevel@tonic-gate */
3537c478bd9Sstevel@tonic-gate static void turn_on_logging(void);
3547c478bd9Sstevel@tonic-gate static void defaults(void);
3557c478bd9Sstevel@tonic-gate static void usage(void);
3567c478bd9Sstevel@tonic-gate static void process_rlogin(void);
3577c478bd9Sstevel@tonic-gate static void login_authenticate();
3587c478bd9Sstevel@tonic-gate static void setup_credentials(void);
3597c478bd9Sstevel@tonic-gate static void adjust_nice(void);
3607c478bd9Sstevel@tonic-gate static void update_utmpx_entry(int);
3617c478bd9Sstevel@tonic-gate static void establish_user_environment(char **);
3627c478bd9Sstevel@tonic-gate static void print_banner(void);
3637c478bd9Sstevel@tonic-gate static void display_last_login_time(void);
3647c478bd9Sstevel@tonic-gate static void exec_the_shell(void);
3657c478bd9Sstevel@tonic-gate static int process_chroot_logins(void);
3667c478bd9Sstevel@tonic-gate static void chdir_to_dir_user(void);
3677c478bd9Sstevel@tonic-gate static void check_log(void);
3687c478bd9Sstevel@tonic-gate static void validate_account(void);
3697c478bd9Sstevel@tonic-gate static void doremoteterm(char *);
3707c478bd9Sstevel@tonic-gate static int get_options(int, char **);
3717c478bd9Sstevel@tonic-gate static void getstr(char *, int, char *);
3727c478bd9Sstevel@tonic-gate static int legalenvvar(char *);
3737c478bd9Sstevel@tonic-gate static void check_for_console(void);
3747c478bd9Sstevel@tonic-gate static void check_for_dueling_unix(char *);
3757c478bd9Sstevel@tonic-gate static void get_user_name(void);
3767c478bd9Sstevel@tonic-gate static uint_t get_audit_id(void);
377032624d5Sbasabi static void login_exit(int)__NORETURN;
3787c478bd9Sstevel@tonic-gate static int logins_disabled(char *);
3797c478bd9Sstevel@tonic-gate static void log_bad_attempts(void);
3807c478bd9Sstevel@tonic-gate static int is_number(char *);
3817c478bd9Sstevel@tonic-gate
3827c478bd9Sstevel@tonic-gate /*
3837c478bd9Sstevel@tonic-gate * *** main ***
3847c478bd9Sstevel@tonic-gate *
3857c478bd9Sstevel@tonic-gate * The primary flow of control is directed in this routine.
3867c478bd9Sstevel@tonic-gate * Control moves in line from top to bottom calling subfunctions
3877c478bd9Sstevel@tonic-gate * which perform the bulk of the work. Many of these calls exit
3887c478bd9Sstevel@tonic-gate * when a fatal error is encountered and do not return to main.
3897c478bd9Sstevel@tonic-gate *
3907c478bd9Sstevel@tonic-gate *
3917c478bd9Sstevel@tonic-gate */
3927c478bd9Sstevel@tonic-gate
393032624d5Sbasabi int
main(int argc,char * argv[],char ** renvp)3947c478bd9Sstevel@tonic-gate main(int argc, char *argv[], char **renvp)
3957c478bd9Sstevel@tonic-gate {
3967c478bd9Sstevel@tonic-gate int sublogin;
3977c478bd9Sstevel@tonic-gate int pam_rc;
3987c478bd9Sstevel@tonic-gate
399f0243e0aSrz201010 login_pid = getpid();
400f0243e0aSrz201010
4017c478bd9Sstevel@tonic-gate /*
4027c478bd9Sstevel@tonic-gate * Set up Defaults and flags
4037c478bd9Sstevel@tonic-gate */
4047c478bd9Sstevel@tonic-gate defaults();
4057c478bd9Sstevel@tonic-gate SCPYL(progname, PROG_NAME);
4067c478bd9Sstevel@tonic-gate
4077c478bd9Sstevel@tonic-gate /*
4087c478bd9Sstevel@tonic-gate * Set up default umask
4097c478bd9Sstevel@tonic-gate */
4107c478bd9Sstevel@tonic-gate if (Umask > ((mode_t)0777))
4117c478bd9Sstevel@tonic-gate Umask = DEFUMASK;
4127c478bd9Sstevel@tonic-gate (void) umask(Umask);
4137c478bd9Sstevel@tonic-gate
4147c478bd9Sstevel@tonic-gate /*
4157c478bd9Sstevel@tonic-gate * Set up default timeouts and delays
4167c478bd9Sstevel@tonic-gate */
4177c478bd9Sstevel@tonic-gate if (Def_timeout > MAX_TIMEOUT)
4187c478bd9Sstevel@tonic-gate Def_timeout = MAX_TIMEOUT;
4197c478bd9Sstevel@tonic-gate if (Sleeptime < 0 || Sleeptime > 5)
4207c478bd9Sstevel@tonic-gate Sleeptime = SLEEPTIME;
4217c478bd9Sstevel@tonic-gate
4227c478bd9Sstevel@tonic-gate (void) alarm(Def_timeout);
4237c478bd9Sstevel@tonic-gate
4247c478bd9Sstevel@tonic-gate /*
4257c478bd9Sstevel@tonic-gate * Ignore SIGQUIT and SIGINT and set nice to 0
4267c478bd9Sstevel@tonic-gate */
4277c478bd9Sstevel@tonic-gate (void) signal(SIGQUIT, SIG_IGN);
4287c478bd9Sstevel@tonic-gate (void) signal(SIGINT, SIG_IGN);
4297c478bd9Sstevel@tonic-gate (void) nice(0);
4307c478bd9Sstevel@tonic-gate
4317c478bd9Sstevel@tonic-gate /*
4327c478bd9Sstevel@tonic-gate * Set flag to disable the pid check if you find that you are
4337c478bd9Sstevel@tonic-gate * a subsystem login.
4347c478bd9Sstevel@tonic-gate */
4357c478bd9Sstevel@tonic-gate sublogin = 0;
4367c478bd9Sstevel@tonic-gate if (*renvp && strcmp(*renvp, SUBLOGIN) == 0)
4377c478bd9Sstevel@tonic-gate sublogin = 1;
4387c478bd9Sstevel@tonic-gate
4397c478bd9Sstevel@tonic-gate /*
4407c478bd9Sstevel@tonic-gate * Parse Arguments
4417c478bd9Sstevel@tonic-gate */
4427c478bd9Sstevel@tonic-gate if (get_options(argc, argv) == -1) {
4437c478bd9Sstevel@tonic-gate usage();
4447c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_BAD_CMD;
4457c478bd9Sstevel@tonic-gate login_exit(1);
4467c478bd9Sstevel@tonic-gate }
4477c478bd9Sstevel@tonic-gate
4487c478bd9Sstevel@tonic-gate /*
4497c478bd9Sstevel@tonic-gate * if devicename is not passed as argument, call ttyname(0)
4507c478bd9Sstevel@tonic-gate */
4517c478bd9Sstevel@tonic-gate if (ttyn == NULL) {
4527c478bd9Sstevel@tonic-gate ttyn = ttyname(0);
4537c478bd9Sstevel@tonic-gate if (ttyn == NULL)
4547c478bd9Sstevel@tonic-gate ttyn = "/dev/???";
4557c478bd9Sstevel@tonic-gate }
4567c478bd9Sstevel@tonic-gate
4577c478bd9Sstevel@tonic-gate /*
4587c478bd9Sstevel@tonic-gate * Call pam_start to initiate a PAM authentication operation
4597c478bd9Sstevel@tonic-gate */
4607c478bd9Sstevel@tonic-gate
4617c478bd9Sstevel@tonic-gate if ((pam_rc = pam_start(progname, user_name, &pam_conv, &pamh))
4627c478bd9Sstevel@tonic-gate != PAM_SUCCESS) {
4637c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + pam_rc;
4647c478bd9Sstevel@tonic-gate login_exit(1);
4657c478bd9Sstevel@tonic-gate }
4667c478bd9Sstevel@tonic-gate if ((pam_rc = pam_set_item(pamh, PAM_TTY, ttyn)) != PAM_SUCCESS) {
4677c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + pam_rc;
4687c478bd9Sstevel@tonic-gate login_exit(1);
4697c478bd9Sstevel@tonic-gate }
4707c478bd9Sstevel@tonic-gate if ((pam_rc = pam_set_item(pamh, PAM_RHOST, remote_host)) !=
4717c478bd9Sstevel@tonic-gate PAM_SUCCESS) {
4727c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + pam_rc;
4737c478bd9Sstevel@tonic-gate login_exit(1);
4747c478bd9Sstevel@tonic-gate }
4757c478bd9Sstevel@tonic-gate
4767c478bd9Sstevel@tonic-gate /*
4777c478bd9Sstevel@tonic-gate * We currently only support special handling of the KRB5 PAM repository
4787c478bd9Sstevel@tonic-gate */
4797c478bd9Sstevel@tonic-gate if ((Rflag && strlen(repository)) &&
4807c478bd9Sstevel@tonic-gate strcmp(repository, KRB5_REPOSITORY_NAME) == 0 &&
4817c478bd9Sstevel@tonic-gate (uflag && strlen(identity))) {
4827c478bd9Sstevel@tonic-gate krb5_repository_data_t krb5_data;
4837c478bd9Sstevel@tonic-gate pam_repository_t pam_rep_data;
4847c478bd9Sstevel@tonic-gate
4857c478bd9Sstevel@tonic-gate krb5_data.principal = identity;
4867c478bd9Sstevel@tonic-gate krb5_data.flags = SUNW_PAM_KRB5_ALREADY_AUTHENTICATED;
4877c478bd9Sstevel@tonic-gate
4887c478bd9Sstevel@tonic-gate pam_rep_data.type = repository;
4897c478bd9Sstevel@tonic-gate pam_rep_data.scope = (void *)&krb5_data;
4907c478bd9Sstevel@tonic-gate pam_rep_data.scope_len = sizeof (krb5_data);
4917c478bd9Sstevel@tonic-gate
4927c478bd9Sstevel@tonic-gate (void) pam_set_item(pamh, PAM_REPOSITORY,
4937c478bd9Sstevel@tonic-gate (void *)&pam_rep_data);
4947c478bd9Sstevel@tonic-gate }
4957c478bd9Sstevel@tonic-gate
4967c478bd9Sstevel@tonic-gate /*
4977c478bd9Sstevel@tonic-gate * Open the log file which contains a record of successful and failed
4987c478bd9Sstevel@tonic-gate * login attempts
4997c478bd9Sstevel@tonic-gate */
5007c478bd9Sstevel@tonic-gate turn_on_logging();
5017c478bd9Sstevel@tonic-gate
5027c478bd9Sstevel@tonic-gate /*
5037c478bd9Sstevel@tonic-gate * say "hi" to syslogd ..
5047c478bd9Sstevel@tonic-gate */
5057c478bd9Sstevel@tonic-gate openlog("login", 0, LOG_AUTH);
5067c478bd9Sstevel@tonic-gate
5077c478bd9Sstevel@tonic-gate /*
5087c478bd9Sstevel@tonic-gate * Do special processing for -r (rlogin) flag
5097c478bd9Sstevel@tonic-gate */
5107c478bd9Sstevel@tonic-gate if (rflag)
5117c478bd9Sstevel@tonic-gate process_rlogin();
5127c478bd9Sstevel@tonic-gate
5137c478bd9Sstevel@tonic-gate /*
5147c478bd9Sstevel@tonic-gate * validate user
5157c478bd9Sstevel@tonic-gate */
5167c478bd9Sstevel@tonic-gate /* we are already authenticated. fill in what we must, then continue */
5177c478bd9Sstevel@tonic-gate if (fflag) {
5187c478bd9Sstevel@tonic-gate if ((pwd = getpwnam(user_name)) == NULL) {
5197c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_USERNAME;
5207c478bd9Sstevel@tonic-gate
5217c478bd9Sstevel@tonic-gate log_bad_attempts();
5227c478bd9Sstevel@tonic-gate (void) printf("Login failed: unknown user '%s'.\n",
5237c478bd9Sstevel@tonic-gate user_name);
5247c478bd9Sstevel@tonic-gate login_exit(1);
5257c478bd9Sstevel@tonic-gate }
5267c478bd9Sstevel@tonic-gate } else {
5277c478bd9Sstevel@tonic-gate /*
5287c478bd9Sstevel@tonic-gate * Perform the primary login authentication activity.
5297c478bd9Sstevel@tonic-gate */
5307c478bd9Sstevel@tonic-gate login_authenticate();
5317c478bd9Sstevel@tonic-gate }
5327c478bd9Sstevel@tonic-gate
5337c478bd9Sstevel@tonic-gate /* change root login, then we exec another login and try again */
5347c478bd9Sstevel@tonic-gate if (process_chroot_logins() != OK)
5357c478bd9Sstevel@tonic-gate login_exit(1);
5367c478bd9Sstevel@tonic-gate
5377c478bd9Sstevel@tonic-gate /*
5387c478bd9Sstevel@tonic-gate * If root login and not on system console then call exit(2)
5397c478bd9Sstevel@tonic-gate */
5407c478bd9Sstevel@tonic-gate check_for_console();
5417c478bd9Sstevel@tonic-gate
5427c478bd9Sstevel@tonic-gate /*
5437c478bd9Sstevel@tonic-gate * Check to see if a shutdown is in progress, if it is and
5447c478bd9Sstevel@tonic-gate * we are not root then throw the user off the system
5457c478bd9Sstevel@tonic-gate */
5467c478bd9Sstevel@tonic-gate if (logins_disabled(user_name) == TRUE) {
5477c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_LOGIN_DISABLED;
5487c478bd9Sstevel@tonic-gate login_exit(1);
5497c478bd9Sstevel@tonic-gate }
5507c478bd9Sstevel@tonic-gate
5517c478bd9Sstevel@tonic-gate if (pwd->pw_uid == 0) {
5527c478bd9Sstevel@tonic-gate if (Def_supath != NULL)
5537c478bd9Sstevel@tonic-gate Def_path = Def_supath;
5547c478bd9Sstevel@tonic-gate else
5557c478bd9Sstevel@tonic-gate Def_path = DEF_SUPATH;
5567c478bd9Sstevel@tonic-gate }
5577c478bd9Sstevel@tonic-gate
5587c478bd9Sstevel@tonic-gate /*
5597c478bd9Sstevel@tonic-gate * Check account expiration and passwd aging
5607c478bd9Sstevel@tonic-gate */
5617c478bd9Sstevel@tonic-gate validate_account();
5627c478bd9Sstevel@tonic-gate
5637c478bd9Sstevel@tonic-gate /*
5647c478bd9Sstevel@tonic-gate * We only get here if we've been authenticated.
5657c478bd9Sstevel@tonic-gate */
5667c478bd9Sstevel@tonic-gate
5677c478bd9Sstevel@tonic-gate /*
5687c478bd9Sstevel@tonic-gate * Now we set up the environment for the new user, which includes
5697c478bd9Sstevel@tonic-gate * the users ulimit, nice value, ownership of this tty, uid, gid,
5707c478bd9Sstevel@tonic-gate * and environment variables.
5717c478bd9Sstevel@tonic-gate */
5727c478bd9Sstevel@tonic-gate if (Def_ulimit > 0L && ulimit(SET_FSIZ, Def_ulimit) < 0L)
5737c478bd9Sstevel@tonic-gate (void) printf("Could not set ULIMIT to %ld\n", Def_ulimit);
5747c478bd9Sstevel@tonic-gate
5757c478bd9Sstevel@tonic-gate /* di_devperm_login() sends detailed errors to syslog */
5767c478bd9Sstevel@tonic-gate if (di_devperm_login((const char *)ttyn, pwd->pw_uid, pwd->pw_gid,
5777c478bd9Sstevel@tonic-gate NULL) == -1) {
5787c478bd9Sstevel@tonic-gate (void) fprintf(stderr, "error processing /etc/logindevperm,"
5797c478bd9Sstevel@tonic-gate " see syslog for more details\n");
5807c478bd9Sstevel@tonic-gate }
5817c478bd9Sstevel@tonic-gate
5827c478bd9Sstevel@tonic-gate adjust_nice(); /* passwd file can specify nice value */
5837c478bd9Sstevel@tonic-gate
584f0243e0aSrz201010 setup_credentials(); /* Set user credentials - exits on failure */
585f0243e0aSrz201010
586f0243e0aSrz201010 /*
587f0243e0aSrz201010 * NOTE: telnetd and rlogind rely upon this updating of utmpx
588f0243e0aSrz201010 * to indicate that the authentication completed successfully,
589f0243e0aSrz201010 * pam_open_session was called and therefore they are required to
590f0243e0aSrz201010 * call pam_close_session.
591f0243e0aSrz201010 */
592f0243e0aSrz201010 update_utmpx_entry(sublogin);
593f0243e0aSrz201010
594f0243e0aSrz201010 /* set the real (and effective) UID */
595f0243e0aSrz201010 if (setuid(pwd->pw_uid) == -1) {
596f0243e0aSrz201010 login_exit(1);
597f0243e0aSrz201010 }
5987c478bd9Sstevel@tonic-gate
5997c478bd9Sstevel@tonic-gate /*
6007c478bd9Sstevel@tonic-gate * Set up the basic environment for the exec. This includes
6017c478bd9Sstevel@tonic-gate * HOME, PATH, LOGNAME, SHELL, TERM, TZ, HZ, and MAIL.
6027c478bd9Sstevel@tonic-gate */
6037c478bd9Sstevel@tonic-gate chdir_to_dir_user();
6047c478bd9Sstevel@tonic-gate
6057c478bd9Sstevel@tonic-gate establish_user_environment(renvp);
6067c478bd9Sstevel@tonic-gate
6077c478bd9Sstevel@tonic-gate (void) pam_end(pamh, PAM_SUCCESS); /* Done using PAM */
6087c478bd9Sstevel@tonic-gate pamh = NULL;
6097c478bd9Sstevel@tonic-gate
6107c478bd9Sstevel@tonic-gate if (pwd->pw_uid == 0) {
6117c478bd9Sstevel@tonic-gate if (dosyslog) {
6127c478bd9Sstevel@tonic-gate if (remote_host[0]) {
6137c478bd9Sstevel@tonic-gate syslog(LOG_NOTICE, "ROOT LOGIN %s FROM %.*s",
6147c478bd9Sstevel@tonic-gate ttyn, HMAX, remote_host);
6157c478bd9Sstevel@tonic-gate } else
6167c478bd9Sstevel@tonic-gate syslog(LOG_NOTICE, "ROOT LOGIN %s", ttyn);
6177c478bd9Sstevel@tonic-gate }
6187c478bd9Sstevel@tonic-gate }
6197c478bd9Sstevel@tonic-gate closelog();
6207c478bd9Sstevel@tonic-gate
6217c478bd9Sstevel@tonic-gate (void) signal(SIGQUIT, SIG_DFL);
6227c478bd9Sstevel@tonic-gate (void) signal(SIGINT, SIG_DFL);
6237c478bd9Sstevel@tonic-gate
6247c478bd9Sstevel@tonic-gate /*
6257c478bd9Sstevel@tonic-gate * Display some useful information to the new user like the banner
6267c478bd9Sstevel@tonic-gate * and last login time if not a quiet login.
6277c478bd9Sstevel@tonic-gate */
6287c478bd9Sstevel@tonic-gate
6297c478bd9Sstevel@tonic-gate if (access(HUSHLOGIN, F_OK) != 0) {
6307c478bd9Sstevel@tonic-gate print_banner();
6317c478bd9Sstevel@tonic-gate display_last_login_time();
6327c478bd9Sstevel@tonic-gate }
6337c478bd9Sstevel@tonic-gate
6347c478bd9Sstevel@tonic-gate /*
6357c478bd9Sstevel@tonic-gate * Set SIGXCPU and SIGXFSZ to default disposition.
6367c478bd9Sstevel@tonic-gate * Shells inherit signal disposition from parent.
6377c478bd9Sstevel@tonic-gate * And the shells should have default dispositions
6387c478bd9Sstevel@tonic-gate * for the two below signals.
6397c478bd9Sstevel@tonic-gate */
6407c478bd9Sstevel@tonic-gate (void) signal(SIGXCPU, SIG_DFL);
6417c478bd9Sstevel@tonic-gate (void) signal(SIGXFSZ, SIG_DFL);
6427c478bd9Sstevel@tonic-gate
6437c478bd9Sstevel@tonic-gate /*
6447c478bd9Sstevel@tonic-gate * Now fire off the shell of choice
6457c478bd9Sstevel@tonic-gate */
6467c478bd9Sstevel@tonic-gate exec_the_shell();
6477c478bd9Sstevel@tonic-gate
6487c478bd9Sstevel@tonic-gate /*
6497c478bd9Sstevel@tonic-gate * All done
6507c478bd9Sstevel@tonic-gate */
6517c478bd9Sstevel@tonic-gate login_exit(1);
652032624d5Sbasabi return (0);
6537c478bd9Sstevel@tonic-gate }
6547c478bd9Sstevel@tonic-gate
6557c478bd9Sstevel@tonic-gate
6567c478bd9Sstevel@tonic-gate /*
6577c478bd9Sstevel@tonic-gate * *** Utility functions ***
6587c478bd9Sstevel@tonic-gate */
6597c478bd9Sstevel@tonic-gate
6607c478bd9Sstevel@tonic-gate
6617c478bd9Sstevel@tonic-gate
6627c478bd9Sstevel@tonic-gate /*
6637c478bd9Sstevel@tonic-gate * donothing & catch - Signal catching functions
6647c478bd9Sstevel@tonic-gate */
6657c478bd9Sstevel@tonic-gate
6667c478bd9Sstevel@tonic-gate /*ARGSUSED*/
6677c478bd9Sstevel@tonic-gate static void
donothing(int sig)6687c478bd9Sstevel@tonic-gate donothing(int sig)
6697c478bd9Sstevel@tonic-gate {
6707c478bd9Sstevel@tonic-gate if (pamh)
6717c478bd9Sstevel@tonic-gate (void) pam_end(pamh, PAM_ABORT);
6727c478bd9Sstevel@tonic-gate }
6737c478bd9Sstevel@tonic-gate
6747c478bd9Sstevel@tonic-gate #ifdef notdef
6757c478bd9Sstevel@tonic-gate static int intrupt;
6767c478bd9Sstevel@tonic-gate
6777c478bd9Sstevel@tonic-gate /*ARGSUSED*/
6787c478bd9Sstevel@tonic-gate static void
catch(int sig)6797c478bd9Sstevel@tonic-gate catch(int sig)
6807c478bd9Sstevel@tonic-gate {
6817c478bd9Sstevel@tonic-gate ++intrupt;
6827c478bd9Sstevel@tonic-gate }
6837c478bd9Sstevel@tonic-gate #endif
6847c478bd9Sstevel@tonic-gate
6857c478bd9Sstevel@tonic-gate /*
6867c478bd9Sstevel@tonic-gate * *** Bad login logging support ***
6877c478bd9Sstevel@tonic-gate */
6887c478bd9Sstevel@tonic-gate
6897c478bd9Sstevel@tonic-gate /*
6907c478bd9Sstevel@tonic-gate * badlogin() - log to the log file 'trys'
6917c478bd9Sstevel@tonic-gate * unsuccessful attempts
6927c478bd9Sstevel@tonic-gate */
6937c478bd9Sstevel@tonic-gate
6947c478bd9Sstevel@tonic-gate static void
badlogin(void)6957c478bd9Sstevel@tonic-gate badlogin(void)
6967c478bd9Sstevel@tonic-gate {
6977c478bd9Sstevel@tonic-gate int retval, count1, fildes;
6987c478bd9Sstevel@tonic-gate
6997c478bd9Sstevel@tonic-gate /*
7007c478bd9Sstevel@tonic-gate * Tries to open the log file. If succeed, lock it and write
7017c478bd9Sstevel@tonic-gate * in the failed attempts
7027c478bd9Sstevel@tonic-gate */
7037c478bd9Sstevel@tonic-gate if ((fildes = open(LOGINLOG, O_APPEND|O_WRONLY)) != -1) {
7047c478bd9Sstevel@tonic-gate
7057c478bd9Sstevel@tonic-gate (void) sigset(SIGALRM, donothing);
7067c478bd9Sstevel@tonic-gate (void) alarm(L_WAITTIME);
7077c478bd9Sstevel@tonic-gate retval = lockf(fildes, F_LOCK, 0L);
7087c478bd9Sstevel@tonic-gate (void) alarm(0);
7097c478bd9Sstevel@tonic-gate (void) sigset(SIGALRM, SIG_DFL);
7107c478bd9Sstevel@tonic-gate if (retval == 0) {
7117c478bd9Sstevel@tonic-gate for (count1 = 0; count1 < trys; count1++)
7127c478bd9Sstevel@tonic-gate (void) write(fildes, log_entry[count1],
7137c478bd9Sstevel@tonic-gate (unsigned)strlen(log_entry[count1]));
7147c478bd9Sstevel@tonic-gate (void) lockf(fildes, F_ULOCK, 0L);
7157c478bd9Sstevel@tonic-gate }
7167c478bd9Sstevel@tonic-gate (void) close(fildes);
7177c478bd9Sstevel@tonic-gate }
7187c478bd9Sstevel@tonic-gate }
7197c478bd9Sstevel@tonic-gate
7207c478bd9Sstevel@tonic-gate
7217c478bd9Sstevel@tonic-gate /*
7227c478bd9Sstevel@tonic-gate * log_bad_attempts - log each bad login attempt - called from
7237c478bd9Sstevel@tonic-gate * login_authenticate. Exits when the maximum attempt
7247c478bd9Sstevel@tonic-gate * count is exceeded.
7257c478bd9Sstevel@tonic-gate */
7267c478bd9Sstevel@tonic-gate
7277c478bd9Sstevel@tonic-gate static void
log_bad_attempts(void)7287c478bd9Sstevel@tonic-gate log_bad_attempts(void)
7297c478bd9Sstevel@tonic-gate {
7307c478bd9Sstevel@tonic-gate time_t timenow;
7317c478bd9Sstevel@tonic-gate
7327c478bd9Sstevel@tonic-gate if (trys >= LOGTRYS)
7337c478bd9Sstevel@tonic-gate return;
7347c478bd9Sstevel@tonic-gate if (writelog) {
7357c478bd9Sstevel@tonic-gate (void) time(&timenow);
7367c478bd9Sstevel@tonic-gate (void) strncat(log_entry[trys], user_name, LNAME_SIZE);
7377c478bd9Sstevel@tonic-gate (void) strncat(log_entry[trys], ":", (size_t)1);
7387c478bd9Sstevel@tonic-gate (void) strncat(log_entry[trys], ttyn, TTYN_SIZE);
7397c478bd9Sstevel@tonic-gate (void) strncat(log_entry[trys], ":", (size_t)1);
7402a0352b4Sgww (void) strncat(log_entry[trys], ctime(&timenow), TIME_SIZE);
7417c478bd9Sstevel@tonic-gate trys++;
7427c478bd9Sstevel@tonic-gate }
7437c478bd9Sstevel@tonic-gate if (count > flogin) {
7447c478bd9Sstevel@tonic-gate if ((pwd = getpwnam(user_name)) != NULL) {
7457c478bd9Sstevel@tonic-gate if (remote_host[0]) {
7467c478bd9Sstevel@tonic-gate syslog(LOG_NOTICE,
7477c478bd9Sstevel@tonic-gate "Login failure on %s from %.*s, "
7487c478bd9Sstevel@tonic-gate "%.*s", ttyn, HMAX, remote_host,
7497c478bd9Sstevel@tonic-gate NMAX, user_name);
7507c478bd9Sstevel@tonic-gate } else {
7517c478bd9Sstevel@tonic-gate syslog(LOG_NOTICE,
7527c478bd9Sstevel@tonic-gate "Login failure on %s, %.*s",
7537c478bd9Sstevel@tonic-gate ttyn, NMAX, user_name);
7547c478bd9Sstevel@tonic-gate }
7557c478bd9Sstevel@tonic-gate } else {
7567c478bd9Sstevel@tonic-gate if (remote_host[0]) {
7577c478bd9Sstevel@tonic-gate syslog(LOG_NOTICE,
7587c478bd9Sstevel@tonic-gate "Login failure on %s from %.*s",
7597c478bd9Sstevel@tonic-gate ttyn, HMAX, remote_host);
7607c478bd9Sstevel@tonic-gate } else {
7617c478bd9Sstevel@tonic-gate syslog(LOG_NOTICE,
7627c478bd9Sstevel@tonic-gate "Login failure on %s", ttyn);
7637c478bd9Sstevel@tonic-gate }
7647c478bd9Sstevel@tonic-gate }
7657c478bd9Sstevel@tonic-gate }
7667c478bd9Sstevel@tonic-gate }
7677c478bd9Sstevel@tonic-gate
7687c478bd9Sstevel@tonic-gate
7697c478bd9Sstevel@tonic-gate /*
7707c478bd9Sstevel@tonic-gate * turn_on_logging - if the logfile exist, turn on attempt logging and
7717c478bd9Sstevel@tonic-gate * initialize the string storage area
7727c478bd9Sstevel@tonic-gate */
7737c478bd9Sstevel@tonic-gate
7747c478bd9Sstevel@tonic-gate static void
turn_on_logging(void)7757c478bd9Sstevel@tonic-gate turn_on_logging(void)
7767c478bd9Sstevel@tonic-gate {
7777c478bd9Sstevel@tonic-gate struct stat dbuf;
7787c478bd9Sstevel@tonic-gate int i;
7797c478bd9Sstevel@tonic-gate
7807c478bd9Sstevel@tonic-gate if (stat(LOGINLOG, &dbuf) == 0) {
7817c478bd9Sstevel@tonic-gate writelog = 1;
7827c478bd9Sstevel@tonic-gate for (i = 0; i < LOGTRYS; i++) {
7837c478bd9Sstevel@tonic-gate if (!(log_entry[i] = malloc((size_t)ENT_SIZE))) {
7847c478bd9Sstevel@tonic-gate writelog = 0;
7857c478bd9Sstevel@tonic-gate break;
7867c478bd9Sstevel@tonic-gate }
7877c478bd9Sstevel@tonic-gate *log_entry[i] = '\0';
7887c478bd9Sstevel@tonic-gate }
7897c478bd9Sstevel@tonic-gate }
7907c478bd9Sstevel@tonic-gate }
7917c478bd9Sstevel@tonic-gate
7927c478bd9Sstevel@tonic-gate
7937c478bd9Sstevel@tonic-gate /*
7947c478bd9Sstevel@tonic-gate * login_conv():
7957c478bd9Sstevel@tonic-gate * This is the conv (conversation) function called from
7967c478bd9Sstevel@tonic-gate * a PAM authentication module to print error messages
7977c478bd9Sstevel@tonic-gate * or garner information from the user.
7987c478bd9Sstevel@tonic-gate */
7997c478bd9Sstevel@tonic-gate /*ARGSUSED*/
8007c478bd9Sstevel@tonic-gate static int
login_conv(int num_msg,struct pam_message ** msg,struct pam_response ** response,void * appdata_ptr)8017c478bd9Sstevel@tonic-gate login_conv(int num_msg, struct pam_message **msg,
8027c478bd9Sstevel@tonic-gate struct pam_response **response, void *appdata_ptr)
8037c478bd9Sstevel@tonic-gate {
8047c478bd9Sstevel@tonic-gate struct pam_message *m;
8057c478bd9Sstevel@tonic-gate struct pam_response *r;
8067c478bd9Sstevel@tonic-gate char *temp;
8077c478bd9Sstevel@tonic-gate int k, i;
8087c478bd9Sstevel@tonic-gate
8097c478bd9Sstevel@tonic-gate if (num_msg <= 0)
8107c478bd9Sstevel@tonic-gate return (PAM_CONV_ERR);
8117c478bd9Sstevel@tonic-gate
8127c478bd9Sstevel@tonic-gate *response = calloc(num_msg, sizeof (struct pam_response));
8137c478bd9Sstevel@tonic-gate if (*response == NULL)
8147c478bd9Sstevel@tonic-gate return (PAM_BUF_ERR);
8157c478bd9Sstevel@tonic-gate
8167c478bd9Sstevel@tonic-gate k = num_msg;
8177c478bd9Sstevel@tonic-gate m = *msg;
8187c478bd9Sstevel@tonic-gate r = *response;
8197c478bd9Sstevel@tonic-gate while (k--) {
8207c478bd9Sstevel@tonic-gate
8217c478bd9Sstevel@tonic-gate switch (m->msg_style) {
8227c478bd9Sstevel@tonic-gate
8237c478bd9Sstevel@tonic-gate case PAM_PROMPT_ECHO_OFF:
8247d080b24Sas145665 errno = 0;
8257c478bd9Sstevel@tonic-gate temp = getpassphrase(m->msg);
8267c478bd9Sstevel@tonic-gate if (temp != NULL) {
8277d080b24Sas145665 if (errno == EINTR)
8287d080b24Sas145665 return (PAM_CONV_ERR);
8297d080b24Sas145665
8307c478bd9Sstevel@tonic-gate r->resp = strdup(temp);
8317c478bd9Sstevel@tonic-gate if (r->resp == NULL) {
8327c478bd9Sstevel@tonic-gate /* free responses */
8337c478bd9Sstevel@tonic-gate r = *response;
8347c478bd9Sstevel@tonic-gate for (i = 0; i < num_msg; i++, r++) {
8357c478bd9Sstevel@tonic-gate if (r->resp)
8367c478bd9Sstevel@tonic-gate free(r->resp);
8377c478bd9Sstevel@tonic-gate }
8387c478bd9Sstevel@tonic-gate free(*response);
8397c478bd9Sstevel@tonic-gate *response = NULL;
8407c478bd9Sstevel@tonic-gate return (PAM_BUF_ERR);
8417c478bd9Sstevel@tonic-gate }
8427c478bd9Sstevel@tonic-gate }
8437c478bd9Sstevel@tonic-gate
8447c478bd9Sstevel@tonic-gate m++;
8457c478bd9Sstevel@tonic-gate r++;
8467c478bd9Sstevel@tonic-gate break;
8477c478bd9Sstevel@tonic-gate
8487c478bd9Sstevel@tonic-gate case PAM_PROMPT_ECHO_ON:
8497c478bd9Sstevel@tonic-gate if (m->msg != NULL)
8507c478bd9Sstevel@tonic-gate (void) fputs(m->msg, stdout);
8517c478bd9Sstevel@tonic-gate r->resp = calloc(1, PAM_MAX_RESP_SIZE);
8527c478bd9Sstevel@tonic-gate if (r->resp == NULL) {
8537c478bd9Sstevel@tonic-gate /* free responses */
8547c478bd9Sstevel@tonic-gate r = *response;
8557c478bd9Sstevel@tonic-gate for (i = 0; i < num_msg; i++, r++) {
8567c478bd9Sstevel@tonic-gate if (r->resp)
8577c478bd9Sstevel@tonic-gate free(r->resp);
8587c478bd9Sstevel@tonic-gate }
8597c478bd9Sstevel@tonic-gate free(*response);
8607c478bd9Sstevel@tonic-gate *response = NULL;
8617c478bd9Sstevel@tonic-gate return (PAM_BUF_ERR);
8627c478bd9Sstevel@tonic-gate }
8637c478bd9Sstevel@tonic-gate /*
8647c478bd9Sstevel@tonic-gate * The response might include environment variables
8657c478bd9Sstevel@tonic-gate * information. We should store that information in
8667c478bd9Sstevel@tonic-gate * envp if there is any; otherwise, envp is set to
8677c478bd9Sstevel@tonic-gate * NULL.
8687c478bd9Sstevel@tonic-gate */
8697c478bd9Sstevel@tonic-gate bzero((void *)inputline, MAXLINE);
8707c478bd9Sstevel@tonic-gate
8717c478bd9Sstevel@tonic-gate envp = getargs(inputline);
8727c478bd9Sstevel@tonic-gate
8737c478bd9Sstevel@tonic-gate /* If we read in any input, process it. */
8747c478bd9Sstevel@tonic-gate if (inputline[0] != '\0') {
8757c478bd9Sstevel@tonic-gate int len;
8767c478bd9Sstevel@tonic-gate
8777c478bd9Sstevel@tonic-gate if (envp != (char **)NULL)
8787c478bd9Sstevel@tonic-gate /*
8797c478bd9Sstevel@tonic-gate * If getargs() did not return NULL,
8807c478bd9Sstevel@tonic-gate * *envp is the first string in
8817c478bd9Sstevel@tonic-gate * inputline. envp++ makes envp point
8827c478bd9Sstevel@tonic-gate * to environment variables information
8837c478bd9Sstevel@tonic-gate * or be NULL.
8847c478bd9Sstevel@tonic-gate */
8857c478bd9Sstevel@tonic-gate envp++;
8867c478bd9Sstevel@tonic-gate
8877c478bd9Sstevel@tonic-gate (void) strncpy(r->resp, inputline,
8887c478bd9Sstevel@tonic-gate PAM_MAX_RESP_SIZE-1);
8897c478bd9Sstevel@tonic-gate r->resp[PAM_MAX_RESP_SIZE-1] = NULL;
8907c478bd9Sstevel@tonic-gate len = strlen(r->resp);
8917c478bd9Sstevel@tonic-gate if (r->resp[len-1] == '\n')
8927c478bd9Sstevel@tonic-gate r->resp[len-1] = '\0';
8937c478bd9Sstevel@tonic-gate } else {
8947c478bd9Sstevel@tonic-gate login_exit(1);
8957c478bd9Sstevel@tonic-gate }
8967c478bd9Sstevel@tonic-gate m++;
8977c478bd9Sstevel@tonic-gate r++;
8987c478bd9Sstevel@tonic-gate break;
8997c478bd9Sstevel@tonic-gate
9007c478bd9Sstevel@tonic-gate case PAM_ERROR_MSG:
9017c478bd9Sstevel@tonic-gate if (m->msg != NULL) {
9027c478bd9Sstevel@tonic-gate (void) fputs(m->msg, stderr);
9037c478bd9Sstevel@tonic-gate (void) fputs("\n", stderr);
9047c478bd9Sstevel@tonic-gate }
9057c478bd9Sstevel@tonic-gate m++;
9067c478bd9Sstevel@tonic-gate r++;
9077c478bd9Sstevel@tonic-gate break;
9087c478bd9Sstevel@tonic-gate case PAM_TEXT_INFO:
9097c478bd9Sstevel@tonic-gate if (m->msg != NULL) {
9107c478bd9Sstevel@tonic-gate (void) fputs(m->msg, stdout);
9117c478bd9Sstevel@tonic-gate (void) fputs("\n", stdout);
9127c478bd9Sstevel@tonic-gate }
9137c478bd9Sstevel@tonic-gate m++;
9147c478bd9Sstevel@tonic-gate r++;
9157c478bd9Sstevel@tonic-gate break;
9167c478bd9Sstevel@tonic-gate
9177c478bd9Sstevel@tonic-gate default:
9187c478bd9Sstevel@tonic-gate break;
9197c478bd9Sstevel@tonic-gate }
9207c478bd9Sstevel@tonic-gate }
9217c478bd9Sstevel@tonic-gate return (PAM_SUCCESS);
9227c478bd9Sstevel@tonic-gate }
9237c478bd9Sstevel@tonic-gate
9247c478bd9Sstevel@tonic-gate /*
9257c478bd9Sstevel@tonic-gate * verify_passwd - Authenticates the user.
9267c478bd9Sstevel@tonic-gate * Returns: PAM_SUCCESS if authentication successful,
9277c478bd9Sstevel@tonic-gate * PAM error code if authentication fails.
9287c478bd9Sstevel@tonic-gate */
9297c478bd9Sstevel@tonic-gate
9307c478bd9Sstevel@tonic-gate static int
verify_passwd(void)931032624d5Sbasabi verify_passwd(void)
9327c478bd9Sstevel@tonic-gate {
9337c478bd9Sstevel@tonic-gate int error;
9347c478bd9Sstevel@tonic-gate char *user;
93557c40785SJoep Vesseur int flag = (Passreqflag ? PAM_DISALLOW_NULL_AUTHTOK : 0);
9367c478bd9Sstevel@tonic-gate
9377c478bd9Sstevel@tonic-gate /*
9387c478bd9Sstevel@tonic-gate * PAM authenticates the user for us.
9397c478bd9Sstevel@tonic-gate */
9402a0352b4Sgww error = pam_authenticate(pamh, flag);
9417c478bd9Sstevel@tonic-gate
9427c478bd9Sstevel@tonic-gate /* get the user_name from the pam handle */
9437c478bd9Sstevel@tonic-gate (void) pam_get_item(pamh, PAM_USER, (void**)&user);
9447c478bd9Sstevel@tonic-gate
9457c478bd9Sstevel@tonic-gate if (user == NULL || *user == '\0')
9467c478bd9Sstevel@tonic-gate return (PAM_SYSTEM_ERR);
9477c478bd9Sstevel@tonic-gate
9487c478bd9Sstevel@tonic-gate SCPYL(user_name, user);
9497c478bd9Sstevel@tonic-gate check_for_dueling_unix(user_name);
9507c478bd9Sstevel@tonic-gate
9512a0352b4Sgww if (((pwd = getpwnam(user_name)) == NULL) &&
9522a0352b4Sgww (error != PAM_USER_UNKNOWN)) {
9537c478bd9Sstevel@tonic-gate return (PAM_SYSTEM_ERR);
9547c478bd9Sstevel@tonic-gate }
9557c478bd9Sstevel@tonic-gate
9567c478bd9Sstevel@tonic-gate return (error);
9577c478bd9Sstevel@tonic-gate }
9587c478bd9Sstevel@tonic-gate
9597c478bd9Sstevel@tonic-gate /*
9607c478bd9Sstevel@tonic-gate * quotec - Called by getargs
9617c478bd9Sstevel@tonic-gate */
9627c478bd9Sstevel@tonic-gate
9637c478bd9Sstevel@tonic-gate static int
quotec(void)9647c478bd9Sstevel@tonic-gate quotec(void)
9657c478bd9Sstevel@tonic-gate {
9667c478bd9Sstevel@tonic-gate int c, i, num;
9677c478bd9Sstevel@tonic-gate
9687c478bd9Sstevel@tonic-gate switch (c = getc(stdin)) {
9697c478bd9Sstevel@tonic-gate
9707c478bd9Sstevel@tonic-gate case 'n':
9717c478bd9Sstevel@tonic-gate c = '\n';
9727c478bd9Sstevel@tonic-gate break;
9737c478bd9Sstevel@tonic-gate
9747c478bd9Sstevel@tonic-gate case 'r':
9757c478bd9Sstevel@tonic-gate c = '\r';
9767c478bd9Sstevel@tonic-gate break;
9777c478bd9Sstevel@tonic-gate
9787c478bd9Sstevel@tonic-gate case 'v':
9797c478bd9Sstevel@tonic-gate c = '\013';
9807c478bd9Sstevel@tonic-gate break;
9817c478bd9Sstevel@tonic-gate
9827c478bd9Sstevel@tonic-gate case 'b':
9837c478bd9Sstevel@tonic-gate c = '\b';
9847c478bd9Sstevel@tonic-gate break;
9857c478bd9Sstevel@tonic-gate
9867c478bd9Sstevel@tonic-gate case 't':
9877c478bd9Sstevel@tonic-gate c = '\t';
9887c478bd9Sstevel@tonic-gate break;
9897c478bd9Sstevel@tonic-gate
9907c478bd9Sstevel@tonic-gate case 'f':
9917c478bd9Sstevel@tonic-gate c = '\f';
9927c478bd9Sstevel@tonic-gate break;
9937c478bd9Sstevel@tonic-gate
9947c478bd9Sstevel@tonic-gate case '0':
9957c478bd9Sstevel@tonic-gate case '1':
9967c478bd9Sstevel@tonic-gate case '2':
9977c478bd9Sstevel@tonic-gate case '3':
9987c478bd9Sstevel@tonic-gate case '4':
9997c478bd9Sstevel@tonic-gate case '5':
10007c478bd9Sstevel@tonic-gate case '6':
10017c478bd9Sstevel@tonic-gate case '7':
10027c478bd9Sstevel@tonic-gate for (num = 0, i = 0; i < 3; i++) {
10037c478bd9Sstevel@tonic-gate num = num * 8 + (c - '0');
10047c478bd9Sstevel@tonic-gate if ((c = getc(stdin)) < '0' || c > '7')
10057c478bd9Sstevel@tonic-gate break;
10067c478bd9Sstevel@tonic-gate }
10077c478bd9Sstevel@tonic-gate (void) ungetc(c, stdin);
10087c478bd9Sstevel@tonic-gate c = num & 0377;
10097c478bd9Sstevel@tonic-gate break;
10107c478bd9Sstevel@tonic-gate
10117c478bd9Sstevel@tonic-gate default:
10127c478bd9Sstevel@tonic-gate break;
10137c478bd9Sstevel@tonic-gate }
10147c478bd9Sstevel@tonic-gate return (c);
10157c478bd9Sstevel@tonic-gate }
10167c478bd9Sstevel@tonic-gate
10177c478bd9Sstevel@tonic-gate /*
10187c478bd9Sstevel@tonic-gate * getargs - returns an input line. Exits if EOF encountered.
10197c478bd9Sstevel@tonic-gate */
10207c478bd9Sstevel@tonic-gate #define WHITESPACE 0
10217c478bd9Sstevel@tonic-gate #define ARGUMENT 1
10227c478bd9Sstevel@tonic-gate
10237c478bd9Sstevel@tonic-gate static char **
getargs(char * input_line)10247c478bd9Sstevel@tonic-gate getargs(char *input_line)
10257c478bd9Sstevel@tonic-gate {
10267c478bd9Sstevel@tonic-gate static char envbuf[MAXLINE];
10277c478bd9Sstevel@tonic-gate static char *args[MAXARGS];
10287c478bd9Sstevel@tonic-gate char *ptr, **answer;
10297c478bd9Sstevel@tonic-gate int c;
10307c478bd9Sstevel@tonic-gate int state;
10317c478bd9Sstevel@tonic-gate char *p = input_line;
10327c478bd9Sstevel@tonic-gate
10337c478bd9Sstevel@tonic-gate ptr = envbuf;
10347c478bd9Sstevel@tonic-gate answer = &args[0];
10357c478bd9Sstevel@tonic-gate state = WHITESPACE;
10367c478bd9Sstevel@tonic-gate
10377c478bd9Sstevel@tonic-gate while ((c = getc(stdin)) != EOF && answer < &args[MAXARGS-1]) {
10387c478bd9Sstevel@tonic-gate
10397c478bd9Sstevel@tonic-gate *(input_line++) = c;
10407c478bd9Sstevel@tonic-gate
10417c478bd9Sstevel@tonic-gate switch (c) {
10427c478bd9Sstevel@tonic-gate
10437c478bd9Sstevel@tonic-gate case '\n':
10447c478bd9Sstevel@tonic-gate if (ptr == &envbuf[0])
10457c478bd9Sstevel@tonic-gate return ((char **)NULL);
10467c478bd9Sstevel@tonic-gate *input_line = *ptr = '\0';
10477c478bd9Sstevel@tonic-gate *answer = NULL;
10487c478bd9Sstevel@tonic-gate return (&args[0]);
10497c478bd9Sstevel@tonic-gate
10507c478bd9Sstevel@tonic-gate case ' ':
10517c478bd9Sstevel@tonic-gate case '\t':
10527c478bd9Sstevel@tonic-gate if (state == ARGUMENT) {
10537c478bd9Sstevel@tonic-gate *ptr++ = '\0';
10547c478bd9Sstevel@tonic-gate state = WHITESPACE;
10557c478bd9Sstevel@tonic-gate }
10567c478bd9Sstevel@tonic-gate break;
10577c478bd9Sstevel@tonic-gate
10587c478bd9Sstevel@tonic-gate case '\\':
10597c478bd9Sstevel@tonic-gate c = quotec();
10607c478bd9Sstevel@tonic-gate
10617c478bd9Sstevel@tonic-gate default:
10627c478bd9Sstevel@tonic-gate if (state == WHITESPACE) {
10637c478bd9Sstevel@tonic-gate *answer++ = ptr;
10647c478bd9Sstevel@tonic-gate state = ARGUMENT;
10657c478bd9Sstevel@tonic-gate }
10667c478bd9Sstevel@tonic-gate *ptr++ = c;
10677c478bd9Sstevel@tonic-gate }
10687c478bd9Sstevel@tonic-gate
10697c478bd9Sstevel@tonic-gate /* Attempt at overflow, exit */
10707c478bd9Sstevel@tonic-gate if (input_line - p >= MAXLINE - 1 ||
10717c478bd9Sstevel@tonic-gate ptr >= &envbuf[sizeof (envbuf) - 1]) {
10727c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_INPUT_OVERFLOW;
10737c478bd9Sstevel@tonic-gate login_exit(1);
10747c478bd9Sstevel@tonic-gate }
10757c478bd9Sstevel@tonic-gate }
10767c478bd9Sstevel@tonic-gate
10777c478bd9Sstevel@tonic-gate /*
10787c478bd9Sstevel@tonic-gate * If we left loop because an EOF was received or we've overflown
10797c478bd9Sstevel@tonic-gate * args[], exit immediately.
10807c478bd9Sstevel@tonic-gate */
10817c478bd9Sstevel@tonic-gate login_exit(0);
10827c478bd9Sstevel@tonic-gate /* NOTREACHED */
10837c478bd9Sstevel@tonic-gate }
10847c478bd9Sstevel@tonic-gate
10857c478bd9Sstevel@tonic-gate /*
10867c478bd9Sstevel@tonic-gate * get_user_name - Gets the user name either passed in, or from the
10877c478bd9Sstevel@tonic-gate * login: prompt.
10887c478bd9Sstevel@tonic-gate */
10897c478bd9Sstevel@tonic-gate
10907c478bd9Sstevel@tonic-gate static void
get_user_name(void)1091032624d5Sbasabi get_user_name(void)
10927c478bd9Sstevel@tonic-gate {
10937c478bd9Sstevel@tonic-gate FILE *fp;
10947c478bd9Sstevel@tonic-gate
10957c478bd9Sstevel@tonic-gate if ((fp = fopen(ISSUEFILE, "r")) != NULL) {
10967c478bd9Sstevel@tonic-gate char *ptr, buffer[BUFSIZ];
10972a0352b4Sgww while ((ptr = fgets(buffer, sizeof (buffer), fp)) != NULL) {
10987c478bd9Sstevel@tonic-gate (void) fputs(ptr, stdout);
10997c478bd9Sstevel@tonic-gate }
11007c478bd9Sstevel@tonic-gate (void) fclose(fp);
11017c478bd9Sstevel@tonic-gate }
11027c478bd9Sstevel@tonic-gate
11037c478bd9Sstevel@tonic-gate /*
11047c478bd9Sstevel@tonic-gate * if TTYPROMPT is not set, use our own prompt
11057c478bd9Sstevel@tonic-gate * otherwise, use ttyprompt. We just set PAM_USER_PROMPT
11067c478bd9Sstevel@tonic-gate * and let the module do the prompting.
11077c478bd9Sstevel@tonic-gate */
11087c478bd9Sstevel@tonic-gate
11097c478bd9Sstevel@tonic-gate if ((ttyprompt == NULL) || (*ttyprompt == '\0'))
11107c478bd9Sstevel@tonic-gate (void) pam_set_item(pamh, PAM_USER_PROMPT, (void *)loginmsg);
11117c478bd9Sstevel@tonic-gate else
11127c478bd9Sstevel@tonic-gate (void) pam_set_item(pamh, PAM_USER_PROMPT, (void *)ttyprompt);
11137c478bd9Sstevel@tonic-gate
11147c478bd9Sstevel@tonic-gate envp = &zero; /* XXX: is this right? */
11157c478bd9Sstevel@tonic-gate }
11167c478bd9Sstevel@tonic-gate
11177c478bd9Sstevel@tonic-gate
11187c478bd9Sstevel@tonic-gate /*
11197c478bd9Sstevel@tonic-gate * Check_for_dueling_unix - Check to see if the another login is talking
11207c478bd9Sstevel@tonic-gate * to the line we've got open as a login port
11217c478bd9Sstevel@tonic-gate * Exits if we're talking to another unix system
11227c478bd9Sstevel@tonic-gate */
11237c478bd9Sstevel@tonic-gate
11247c478bd9Sstevel@tonic-gate static void
check_for_dueling_unix(char * inputline)11257c478bd9Sstevel@tonic-gate check_for_dueling_unix(char *inputline)
11267c478bd9Sstevel@tonic-gate {
11277c478bd9Sstevel@tonic-gate if (EQN(loginmsg, inputline) || EQN(passwdmsg, inputline) ||
11287c478bd9Sstevel@tonic-gate EQN(incorrectmsg, inputline)) {
11297c478bd9Sstevel@tonic-gate (void) printf("Looking at a login line.\n");
11307c478bd9Sstevel@tonic-gate login_exit(8);
11317c478bd9Sstevel@tonic-gate }
11327c478bd9Sstevel@tonic-gate }
11337c478bd9Sstevel@tonic-gate
11347c478bd9Sstevel@tonic-gate /*
11357c478bd9Sstevel@tonic-gate * logins_disabled - if the file /etc/nologin exists and the user is not
11367c478bd9Sstevel@tonic-gate * root then do not permit them to login
11377c478bd9Sstevel@tonic-gate */
11387c478bd9Sstevel@tonic-gate static int
logins_disabled(char * user_name)11397c478bd9Sstevel@tonic-gate logins_disabled(char *user_name)
11407c478bd9Sstevel@tonic-gate {
11417c478bd9Sstevel@tonic-gate FILE *nlfd;
11427c478bd9Sstevel@tonic-gate int c;
11437c478bd9Sstevel@tonic-gate if (!EQN("root", user_name) &&
11447c478bd9Sstevel@tonic-gate ((nlfd = fopen(NOLOGIN, "r")) != (FILE *)NULL)) {
11457c478bd9Sstevel@tonic-gate while ((c = getc(nlfd)) != EOF)
11467c478bd9Sstevel@tonic-gate (void) putchar(c);
11477c478bd9Sstevel@tonic-gate (void) fflush(stdout);
11487c478bd9Sstevel@tonic-gate (void) sleep(5);
11497c478bd9Sstevel@tonic-gate return (TRUE);
11507c478bd9Sstevel@tonic-gate }
11517c478bd9Sstevel@tonic-gate return (FALSE);
11527c478bd9Sstevel@tonic-gate }
11537c478bd9Sstevel@tonic-gate
1154aecfc01dSrui zang - Sun Microsystems - Beijing China #define DEFAULT_CONSOLE "/dev/console"
1155aecfc01dSrui zang - Sun Microsystems - Beijing China
11567c478bd9Sstevel@tonic-gate /*
11577c478bd9Sstevel@tonic-gate * check_for_console - Checks if we're getting a root login on the
11587c478bd9Sstevel@tonic-gate * console, or a login from the global zone. Exits if not.
11597c478bd9Sstevel@tonic-gate *
1160aecfc01dSrui zang - Sun Microsystems - Beijing China * If CONSOLE is set to /dev/console in /etc/default/login, then root logins
1161aecfc01dSrui zang - Sun Microsystems - Beijing China * on /dev/vt/# are permitted as well. /dev/vt/# does not exist in non-global
1162aecfc01dSrui zang - Sun Microsystems - Beijing China * zones, but checking them does no harm.
11637c478bd9Sstevel@tonic-gate */
11647c478bd9Sstevel@tonic-gate static void
check_for_console(void)11657c478bd9Sstevel@tonic-gate check_for_console(void)
11667c478bd9Sstevel@tonic-gate {
1167aecfc01dSrui zang - Sun Microsystems - Beijing China const char *consoles[] = { "/dev/console", "/dev/vt/", NULL };
1168aecfc01dSrui zang - Sun Microsystems - Beijing China int i;
1169aecfc01dSrui zang - Sun Microsystems - Beijing China
1170aecfc01dSrui zang - Sun Microsystems - Beijing China if (pwd == NULL || pwd->pw_uid != 0 || zflag != B_FALSE ||
1171aecfc01dSrui zang - Sun Microsystems - Beijing China Console == NULL)
1172aecfc01dSrui zang - Sun Microsystems - Beijing China return;
1173aecfc01dSrui zang - Sun Microsystems - Beijing China
1174aecfc01dSrui zang - Sun Microsystems - Beijing China if (strcmp(Console, DEFAULT_CONSOLE) == 0) {
1175aecfc01dSrui zang - Sun Microsystems - Beijing China for (i = 0; consoles[i] != NULL; i ++) {
1176aecfc01dSrui zang - Sun Microsystems - Beijing China if (strncmp(ttyn, consoles[i],
1177aecfc01dSrui zang - Sun Microsystems - Beijing China strlen(consoles[i])) == 0)
1178aecfc01dSrui zang - Sun Microsystems - Beijing China return;
1179aecfc01dSrui zang - Sun Microsystems - Beijing China }
1180aecfc01dSrui zang - Sun Microsystems - Beijing China } else {
1181aecfc01dSrui zang - Sun Microsystems - Beijing China if (strcmp(ttyn, Console) == 0)
1182aecfc01dSrui zang - Sun Microsystems - Beijing China return;
1183aecfc01dSrui zang - Sun Microsystems - Beijing China }
1184aecfc01dSrui zang - Sun Microsystems - Beijing China
11857c478bd9Sstevel@tonic-gate (void) printf("Not on system console\n");
11867c478bd9Sstevel@tonic-gate
11877c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_CONSOLE;
11887c478bd9Sstevel@tonic-gate login_exit(10);
1189aecfc01dSrui zang - Sun Microsystems - Beijing China
11907c478bd9Sstevel@tonic-gate }
11917c478bd9Sstevel@tonic-gate
11927c478bd9Sstevel@tonic-gate /*
11937c478bd9Sstevel@tonic-gate * List of environment variables or environment variable prefixes that should
11947c478bd9Sstevel@tonic-gate * not be propagated across logins, such as when the login -p option is used.
11957c478bd9Sstevel@tonic-gate */
11967c478bd9Sstevel@tonic-gate static const char *const illegal[] = {
11977c478bd9Sstevel@tonic-gate "SHELL=",
11987c478bd9Sstevel@tonic-gate "HOME=",
11997c478bd9Sstevel@tonic-gate "LOGNAME=",
12007c478bd9Sstevel@tonic-gate #ifndef NO_MAIL
12017c478bd9Sstevel@tonic-gate "MAIL=",
12027c478bd9Sstevel@tonic-gate #endif
12037c478bd9Sstevel@tonic-gate "CDPATH=",
12047c478bd9Sstevel@tonic-gate "IFS=",
12057c478bd9Sstevel@tonic-gate "PATH=",
12067c478bd9Sstevel@tonic-gate "LD_",
12077c478bd9Sstevel@tonic-gate "SMF_",
12087c478bd9Sstevel@tonic-gate NULL
12097c478bd9Sstevel@tonic-gate };
12107c478bd9Sstevel@tonic-gate
12117c478bd9Sstevel@tonic-gate /*
12127c478bd9Sstevel@tonic-gate * legalenvvar - Is it legal to insert this environmental variable?
12137c478bd9Sstevel@tonic-gate */
12147c478bd9Sstevel@tonic-gate
12157c478bd9Sstevel@tonic-gate static int
legalenvvar(char * s)12167c478bd9Sstevel@tonic-gate legalenvvar(char *s)
12177c478bd9Sstevel@tonic-gate {
12187c478bd9Sstevel@tonic-gate const char *const *p;
12197c478bd9Sstevel@tonic-gate
12207c478bd9Sstevel@tonic-gate for (p = &illegal[0]; *p; p++) {
12217c478bd9Sstevel@tonic-gate if (strncmp(s, *p, strlen(*p)) == 0)
12227c478bd9Sstevel@tonic-gate return (0);
12237c478bd9Sstevel@tonic-gate }
12247c478bd9Sstevel@tonic-gate
12257c478bd9Sstevel@tonic-gate return (1);
12267c478bd9Sstevel@tonic-gate }
12277c478bd9Sstevel@tonic-gate
12287c478bd9Sstevel@tonic-gate
12297c478bd9Sstevel@tonic-gate /*
12307c478bd9Sstevel@tonic-gate * getstr - Get a string from standard input
12317c478bd9Sstevel@tonic-gate * Calls exit if read(2) fails.
12327c478bd9Sstevel@tonic-gate */
12337c478bd9Sstevel@tonic-gate
12347c478bd9Sstevel@tonic-gate static void
getstr(char * buf,int cnt,char * err)12357c478bd9Sstevel@tonic-gate getstr(char *buf, int cnt, char *err)
12367c478bd9Sstevel@tonic-gate {
12377c478bd9Sstevel@tonic-gate char c;
12387c478bd9Sstevel@tonic-gate
12397c478bd9Sstevel@tonic-gate do {
12407c478bd9Sstevel@tonic-gate if (read(0, &c, 1) != 1)
12417c478bd9Sstevel@tonic-gate login_exit(1);
12427c478bd9Sstevel@tonic-gate *buf++ = c;
12437c478bd9Sstevel@tonic-gate } while (--cnt > 1 && c != 0);
12447c478bd9Sstevel@tonic-gate
12457c478bd9Sstevel@tonic-gate *buf = 0;
12467c478bd9Sstevel@tonic-gate err = err; /* For lint */
12477c478bd9Sstevel@tonic-gate }
12487c478bd9Sstevel@tonic-gate
12497c478bd9Sstevel@tonic-gate
12507c478bd9Sstevel@tonic-gate /*
12517c478bd9Sstevel@tonic-gate * defaults - read defaults
12527c478bd9Sstevel@tonic-gate */
12537c478bd9Sstevel@tonic-gate
12547c478bd9Sstevel@tonic-gate static void
defaults(void)12557c478bd9Sstevel@tonic-gate defaults(void)
12567c478bd9Sstevel@tonic-gate {
12577c478bd9Sstevel@tonic-gate int flags;
12587c478bd9Sstevel@tonic-gate char *ptr;
12597c478bd9Sstevel@tonic-gate
12607c478bd9Sstevel@tonic-gate if (defopen(Pndefault) == 0) {
12617c478bd9Sstevel@tonic-gate /*
12627c478bd9Sstevel@tonic-gate * ignore case
12637c478bd9Sstevel@tonic-gate */
12647c478bd9Sstevel@tonic-gate flags = defcntl(DC_GETFLAGS, 0);
12657c478bd9Sstevel@tonic-gate TURNOFF(flags, DC_CASE);
12667c478bd9Sstevel@tonic-gate (void) defcntl(DC_SETFLAGS, flags);
12677c478bd9Sstevel@tonic-gate
12687c478bd9Sstevel@tonic-gate if ((Console = defread("CONSOLE=")) != NULL)
12697c478bd9Sstevel@tonic-gate Console = strdup(Console);
12707c478bd9Sstevel@tonic-gate
12717c478bd9Sstevel@tonic-gate if ((Altshell = defread("ALTSHELL=")) != NULL)
12727c478bd9Sstevel@tonic-gate Altshell = strdup(Altshell);
12737c478bd9Sstevel@tonic-gate
12747c478bd9Sstevel@tonic-gate if ((ptr = defread("PASSREQ=")) != NULL &&
12757c478bd9Sstevel@tonic-gate strcasecmp("YES", ptr) == 0)
12767c478bd9Sstevel@tonic-gate Passreqflag = 1;
12777c478bd9Sstevel@tonic-gate
12787c478bd9Sstevel@tonic-gate if ((Def_tz = defread("TIMEZONE=")) != NULL)
12797c478bd9Sstevel@tonic-gate Def_tz = strdup(Def_tz);
12807c478bd9Sstevel@tonic-gate
12817c478bd9Sstevel@tonic-gate if ((Def_hertz = defread("HZ=")) != NULL)
12827c478bd9Sstevel@tonic-gate Def_hertz = strdup(Def_hertz);
12837c478bd9Sstevel@tonic-gate
12847c478bd9Sstevel@tonic-gate if ((Def_path = defread("PATH=")) != NULL)
12857c478bd9Sstevel@tonic-gate Def_path = strdup(Def_path);
12867c478bd9Sstevel@tonic-gate
12877c478bd9Sstevel@tonic-gate if ((Def_supath = defread("SUPATH=")) != NULL)
12887c478bd9Sstevel@tonic-gate Def_supath = strdup(Def_supath);
12897c478bd9Sstevel@tonic-gate
12907c478bd9Sstevel@tonic-gate if ((ptr = defread("ULIMIT=")) != NULL)
12917c478bd9Sstevel@tonic-gate Def_ulimit = atol(ptr);
12927c478bd9Sstevel@tonic-gate
12937c478bd9Sstevel@tonic-gate if ((ptr = defread("TIMEOUT=")) != NULL)
12947c478bd9Sstevel@tonic-gate Def_timeout = (unsigned)atoi(ptr);
12957c478bd9Sstevel@tonic-gate
12967c478bd9Sstevel@tonic-gate if ((ptr = defread("UMASK=")) != NULL)
12977c478bd9Sstevel@tonic-gate if (sscanf(ptr, "%lo", &Umask) != 1)
12987c478bd9Sstevel@tonic-gate Umask = DEFUMASK;
12997c478bd9Sstevel@tonic-gate
13007c478bd9Sstevel@tonic-gate if ((ptr = defread("SLEEPTIME=")) != NULL) {
13017c478bd9Sstevel@tonic-gate if (is_number(ptr))
13027c478bd9Sstevel@tonic-gate Sleeptime = atoi(ptr);
13037c478bd9Sstevel@tonic-gate }
13047c478bd9Sstevel@tonic-gate
13057c478bd9Sstevel@tonic-gate if ((ptr = defread("DISABLETIME=")) != NULL) {
13067c478bd9Sstevel@tonic-gate if (is_number(ptr))
13077c478bd9Sstevel@tonic-gate Disabletime = atoi(ptr);
13087c478bd9Sstevel@tonic-gate }
13097c478bd9Sstevel@tonic-gate
13107c478bd9Sstevel@tonic-gate if ((ptr = defread("SYSLOG=")) != NULL)
13117c478bd9Sstevel@tonic-gate dosyslog = strcmp(ptr, "YES") == 0;
13127c478bd9Sstevel@tonic-gate
13137c478bd9Sstevel@tonic-gate if ((ptr = defread("RETRIES=")) != NULL) {
13147c478bd9Sstevel@tonic-gate if (is_number(ptr))
13157c478bd9Sstevel@tonic-gate retry = atoi(ptr);
13167c478bd9Sstevel@tonic-gate }
13177c478bd9Sstevel@tonic-gate
13187c478bd9Sstevel@tonic-gate if ((ptr = defread("SYSLOG_FAILED_LOGINS=")) != NULL) {
13197c478bd9Sstevel@tonic-gate if (is_number(ptr))
13207c478bd9Sstevel@tonic-gate flogin = atoi(ptr);
13217c478bd9Sstevel@tonic-gate else
13227c478bd9Sstevel@tonic-gate flogin = retry;
13237c478bd9Sstevel@tonic-gate } else
13247c478bd9Sstevel@tonic-gate flogin = retry;
13257c478bd9Sstevel@tonic-gate (void) defopen((char *)NULL);
13267c478bd9Sstevel@tonic-gate }
13277c478bd9Sstevel@tonic-gate }
13287c478bd9Sstevel@tonic-gate
13297c478bd9Sstevel@tonic-gate
13307c478bd9Sstevel@tonic-gate /*
13317c478bd9Sstevel@tonic-gate * get_options(argc, argv)
13327c478bd9Sstevel@tonic-gate * - parse the cmd line.
13337c478bd9Sstevel@tonic-gate * - return 0 if successful, -1 if failed.
13347c478bd9Sstevel@tonic-gate * Calls login_exit() on misuse of -r, -h, and -z flags
13357c478bd9Sstevel@tonic-gate */
13367c478bd9Sstevel@tonic-gate
13377c478bd9Sstevel@tonic-gate static int
get_options(int argc,char * argv[])13387c478bd9Sstevel@tonic-gate get_options(int argc, char *argv[])
13397c478bd9Sstevel@tonic-gate {
13407c478bd9Sstevel@tonic-gate int c;
13417c478bd9Sstevel@tonic-gate int errflg = 0;
13427c478bd9Sstevel@tonic-gate char sflagname[NMAX+1];
13437c478bd9Sstevel@tonic-gate const char *flags_message = "Only one of -r, -h and -z allowed\n";
13447c478bd9Sstevel@tonic-gate
13457c478bd9Sstevel@tonic-gate while ((c = getopt(argc, argv, "u:s:R:f:h:r:pad:t:U:z:")) != -1) {
13467c478bd9Sstevel@tonic-gate switch (c) {
13477c478bd9Sstevel@tonic-gate case 'a':
13487c478bd9Sstevel@tonic-gate break;
13497c478bd9Sstevel@tonic-gate
13507c478bd9Sstevel@tonic-gate case 'd':
13517c478bd9Sstevel@tonic-gate /*
13527c478bd9Sstevel@tonic-gate * Must be root to pass in device name
13537c478bd9Sstevel@tonic-gate * otherwise we exit() as punishment for trying.
13547c478bd9Sstevel@tonic-gate */
13557c478bd9Sstevel@tonic-gate if (getuid() != 0 || geteuid() != 0) {
13567c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_DEVICE_PERM;
13577c478bd9Sstevel@tonic-gate login_exit(1); /* sigh */
13587c478bd9Sstevel@tonic-gate /*NOTREACHED*/
13597c478bd9Sstevel@tonic-gate }
13607c478bd9Sstevel@tonic-gate ttyn = optarg;
13617c478bd9Sstevel@tonic-gate break;
13627c478bd9Sstevel@tonic-gate
13637c478bd9Sstevel@tonic-gate case 'h':
13647c478bd9Sstevel@tonic-gate if (hflag || rflag || zflag) {
13657c478bd9Sstevel@tonic-gate (void) fprintf(stderr, flags_message);
13667c478bd9Sstevel@tonic-gate login_exit(1);
13677c478bd9Sstevel@tonic-gate }
13687c478bd9Sstevel@tonic-gate hflag = B_TRUE;
13697c478bd9Sstevel@tonic-gate SCPYL(remote_host, optarg);
13707c478bd9Sstevel@tonic-gate if (argv[optind]) {
13717c478bd9Sstevel@tonic-gate if (argv[optind][0] != '-') {
13727c478bd9Sstevel@tonic-gate SCPYL(terminal, argv[optind]);
13737c478bd9Sstevel@tonic-gate optind++;
13747c478bd9Sstevel@tonic-gate } else {
13757c478bd9Sstevel@tonic-gate /*
13767c478bd9Sstevel@tonic-gate * Allow "login -h hostname -" to
13777c478bd9Sstevel@tonic-gate * skip setting up an username as "-".
13787c478bd9Sstevel@tonic-gate */
13797c478bd9Sstevel@tonic-gate if (argv[optind][1] == '\0')
13807c478bd9Sstevel@tonic-gate optind++;
13817c478bd9Sstevel@tonic-gate }
13827c478bd9Sstevel@tonic-gate
13837c478bd9Sstevel@tonic-gate }
13847c478bd9Sstevel@tonic-gate SCPYL(progname, "telnet");
13857c478bd9Sstevel@tonic-gate break;
13867c478bd9Sstevel@tonic-gate
13877c478bd9Sstevel@tonic-gate case 'r':
13887c478bd9Sstevel@tonic-gate if (hflag || rflag || zflag) {
13897c478bd9Sstevel@tonic-gate (void) fprintf(stderr, flags_message);
13907c478bd9Sstevel@tonic-gate login_exit(1);
13917c478bd9Sstevel@tonic-gate }
13927c478bd9Sstevel@tonic-gate rflag = B_TRUE;
13937c478bd9Sstevel@tonic-gate SCPYL(remote_host, optarg);
13947c478bd9Sstevel@tonic-gate SCPYL(progname, "rlogin");
13957c478bd9Sstevel@tonic-gate break;
13967c478bd9Sstevel@tonic-gate
13977c478bd9Sstevel@tonic-gate case 'p':
13987c478bd9Sstevel@tonic-gate pflag = B_TRUE;
13997c478bd9Sstevel@tonic-gate break;
14007c478bd9Sstevel@tonic-gate
14017c478bd9Sstevel@tonic-gate case 'f':
14027c478bd9Sstevel@tonic-gate /*
14037c478bd9Sstevel@tonic-gate * Must be root to bypass authentication
14047c478bd9Sstevel@tonic-gate * otherwise we exit() as punishment for trying.
14057c478bd9Sstevel@tonic-gate */
14067c478bd9Sstevel@tonic-gate if (getuid() != 0 || geteuid() != 0) {
14077c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_AUTH_BYPASS;
14087c478bd9Sstevel@tonic-gate
14097c478bd9Sstevel@tonic-gate login_exit(1); /* sigh */
14107c478bd9Sstevel@tonic-gate /*NOTREACHED*/
14117c478bd9Sstevel@tonic-gate }
14127c478bd9Sstevel@tonic-gate /* save fflag user name for future use */
14137c478bd9Sstevel@tonic-gate SCPYL(user_name, optarg);
14147c478bd9Sstevel@tonic-gate fflag = B_TRUE;
14157c478bd9Sstevel@tonic-gate break;
14167c478bd9Sstevel@tonic-gate case 'u':
14177c478bd9Sstevel@tonic-gate if (!strlen(optarg)) {
14187c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
14197c478bd9Sstevel@tonic-gate "Empty string supplied with -u\n");
14207c478bd9Sstevel@tonic-gate login_exit(1);
14217c478bd9Sstevel@tonic-gate }
14227c478bd9Sstevel@tonic-gate SCPYL(identity, optarg);
14237c478bd9Sstevel@tonic-gate uflag = B_TRUE;
14247c478bd9Sstevel@tonic-gate break;
14257c478bd9Sstevel@tonic-gate case 's':
14267c478bd9Sstevel@tonic-gate if (!strlen(optarg)) {
14277c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
14287c478bd9Sstevel@tonic-gate "Empty string supplied with -s\n");
14297c478bd9Sstevel@tonic-gate login_exit(1);
14307c478bd9Sstevel@tonic-gate }
14317c478bd9Sstevel@tonic-gate SCPYL(sflagname, optarg);
14327c478bd9Sstevel@tonic-gate sflag = B_TRUE;
14337c478bd9Sstevel@tonic-gate break;
14347c478bd9Sstevel@tonic-gate case 'R':
14357c478bd9Sstevel@tonic-gate if (!strlen(optarg)) {
14367c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
14377c478bd9Sstevel@tonic-gate "Empty string supplied with -R\n");
14387c478bd9Sstevel@tonic-gate login_exit(1);
14397c478bd9Sstevel@tonic-gate }
14407c478bd9Sstevel@tonic-gate SCPYL(repository, optarg);
14417c478bd9Sstevel@tonic-gate Rflag = B_TRUE;
14427c478bd9Sstevel@tonic-gate break;
14437c478bd9Sstevel@tonic-gate case 't':
14447c478bd9Sstevel@tonic-gate if (!strlen(optarg)) {
14457c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
14467c478bd9Sstevel@tonic-gate "Empty string supplied with -t\n");
14477c478bd9Sstevel@tonic-gate login_exit(1);
14487c478bd9Sstevel@tonic-gate }
14497c478bd9Sstevel@tonic-gate SCPYL(terminal, optarg);
14507c478bd9Sstevel@tonic-gate tflag = B_TRUE;
14517c478bd9Sstevel@tonic-gate break;
14527c478bd9Sstevel@tonic-gate case 'U':
14537c478bd9Sstevel@tonic-gate /*
14547c478bd9Sstevel@tonic-gate * Kerberized rlogind may fork us with
14557c478bd9Sstevel@tonic-gate * -U "" if the rlogin client used the "-a"
14567c478bd9Sstevel@tonic-gate * option to send a NULL username. This is done
14577c478bd9Sstevel@tonic-gate * to force login to prompt for a user/password.
14587c478bd9Sstevel@tonic-gate * However, if Kerberos auth was used, we dont need
14597c478bd9Sstevel@tonic-gate * to prompt, so we will accept the option and
14607c478bd9Sstevel@tonic-gate * handle the situation later.
14617c478bd9Sstevel@tonic-gate */
14627c478bd9Sstevel@tonic-gate SCPYL(rusername, optarg);
14637c478bd9Sstevel@tonic-gate Uflag = B_TRUE;
14647c478bd9Sstevel@tonic-gate break;
14657c478bd9Sstevel@tonic-gate case 'z':
14667c478bd9Sstevel@tonic-gate if (hflag || rflag || zflag) {
14677c478bd9Sstevel@tonic-gate (void) fprintf(stderr, flags_message);
14687c478bd9Sstevel@tonic-gate login_exit(1);
14697c478bd9Sstevel@tonic-gate }
14707c478bd9Sstevel@tonic-gate (void) snprintf(zone_name, sizeof (zone_name),
14717c478bd9Sstevel@tonic-gate "zone:%s", optarg);
14727c478bd9Sstevel@tonic-gate SCPYL(progname, "zlogin");
14737c478bd9Sstevel@tonic-gate zflag = B_TRUE;
14747c478bd9Sstevel@tonic-gate break;
14757c478bd9Sstevel@tonic-gate default:
14767c478bd9Sstevel@tonic-gate errflg++;
14777c478bd9Sstevel@tonic-gate break;
14787c478bd9Sstevel@tonic-gate } /* end switch */
14797c478bd9Sstevel@tonic-gate } /* end while */
14807c478bd9Sstevel@tonic-gate
14817c478bd9Sstevel@tonic-gate /*
14827c478bd9Sstevel@tonic-gate * If the 's svcname' flag was used, override the progname
14837c478bd9Sstevel@tonic-gate * value that is to be used in the pam_start call.
14847c478bd9Sstevel@tonic-gate */
14857c478bd9Sstevel@tonic-gate if (sflag)
14867c478bd9Sstevel@tonic-gate SCPYL(progname, sflagname);
14877c478bd9Sstevel@tonic-gate
14887c478bd9Sstevel@tonic-gate /*
14897c478bd9Sstevel@tonic-gate * get the prompt set by ttymon
14907c478bd9Sstevel@tonic-gate */
14917c478bd9Sstevel@tonic-gate ttyprompt = getenv("TTYPROMPT");
14927c478bd9Sstevel@tonic-gate
14937c478bd9Sstevel@tonic-gate if ((ttyprompt != NULL) && (*ttyprompt != '\0')) {
14947c478bd9Sstevel@tonic-gate /*
14957c478bd9Sstevel@tonic-gate * if ttyprompt is set, there should be data on
14967c478bd9Sstevel@tonic-gate * the stream already.
14977c478bd9Sstevel@tonic-gate */
14987c478bd9Sstevel@tonic-gate if ((envp = getargs(inputline)) != (char **)NULL) {
14997c478bd9Sstevel@tonic-gate /*
15007c478bd9Sstevel@tonic-gate * don't get name if name passed as argument.
15017c478bd9Sstevel@tonic-gate */
15027c478bd9Sstevel@tonic-gate SCPYL(user_name, *envp++);
15037c478bd9Sstevel@tonic-gate }
15047c478bd9Sstevel@tonic-gate } else if (optind < argc) {
15057c478bd9Sstevel@tonic-gate SCPYL(user_name, argv[optind]);
15067c478bd9Sstevel@tonic-gate (void) SCPYL(inputline, user_name);
15077c478bd9Sstevel@tonic-gate (void) strlcat(inputline, " \n", sizeof (inputline));
15087c478bd9Sstevel@tonic-gate envp = &argv[optind+1];
15097c478bd9Sstevel@tonic-gate
15107c478bd9Sstevel@tonic-gate if (!fflag)
15117c478bd9Sstevel@tonic-gate SCPYL(lusername, user_name);
15127c478bd9Sstevel@tonic-gate }
15137c478bd9Sstevel@tonic-gate
15147c478bd9Sstevel@tonic-gate if (errflg)
15157c478bd9Sstevel@tonic-gate return (-1);
15167c478bd9Sstevel@tonic-gate return (0);
15177c478bd9Sstevel@tonic-gate }
15187c478bd9Sstevel@tonic-gate
15197c478bd9Sstevel@tonic-gate /*
15207c478bd9Sstevel@tonic-gate * usage - Print usage message
15217c478bd9Sstevel@tonic-gate *
15227c478bd9Sstevel@tonic-gate */
15237c478bd9Sstevel@tonic-gate static void
usage(void)15247c478bd9Sstevel@tonic-gate usage(void)
15257c478bd9Sstevel@tonic-gate {
15267c478bd9Sstevel@tonic-gate (void) fprintf(stderr,
15277c478bd9Sstevel@tonic-gate "usage:\n"
15287c478bd9Sstevel@tonic-gate " login [-p] [-d device] [-R repository] [-s service]\n"
15297c478bd9Sstevel@tonic-gate "\t[-t terminal] [-u identity] [-U ruser]\n"
15307c478bd9Sstevel@tonic-gate "\t[-h hostname [terminal] | -r hostname] [name [environ]...]\n");
15317c478bd9Sstevel@tonic-gate
15327c478bd9Sstevel@tonic-gate }
15337c478bd9Sstevel@tonic-gate
15347c478bd9Sstevel@tonic-gate /*
15357c478bd9Sstevel@tonic-gate * doremoteterm - Sets the appropriate ioctls for a remote terminal
15367c478bd9Sstevel@tonic-gate */
15377c478bd9Sstevel@tonic-gate static char *speeds[] = {
15387c478bd9Sstevel@tonic-gate "0", "50", "75", "110", "134", "150", "200", "300",
15397c478bd9Sstevel@tonic-gate "600", "1200", "1800", "2400", "4800", "9600", "19200", "38400",
1540de81e71eSTim Marsland "57600", "76800", "115200", "153600", "230400", "307200", "460800",
1541de81e71eSTim Marsland "921600"
15427c478bd9Sstevel@tonic-gate };
15437c478bd9Sstevel@tonic-gate
15447c478bd9Sstevel@tonic-gate #define NSPEEDS (sizeof (speeds) / sizeof (speeds[0]))
15457c478bd9Sstevel@tonic-gate
15467c478bd9Sstevel@tonic-gate
15477c478bd9Sstevel@tonic-gate static void
doremoteterm(char * term)15487c478bd9Sstevel@tonic-gate doremoteterm(char *term)
15497c478bd9Sstevel@tonic-gate {
15507c478bd9Sstevel@tonic-gate struct termios tp;
15517c478bd9Sstevel@tonic-gate char *cp = strchr(term, '/'), **cpp;
15527c478bd9Sstevel@tonic-gate char *speed;
15537c478bd9Sstevel@tonic-gate
15547c478bd9Sstevel@tonic-gate (void) ioctl(0, TCGETS, &tp);
15557c478bd9Sstevel@tonic-gate
15567c478bd9Sstevel@tonic-gate if (cp) {
15577c478bd9Sstevel@tonic-gate *cp++ = '\0';
15587c478bd9Sstevel@tonic-gate speed = cp;
15597c478bd9Sstevel@tonic-gate cp = strchr(speed, '/');
15607c478bd9Sstevel@tonic-gate
15617c478bd9Sstevel@tonic-gate if (cp)
15627c478bd9Sstevel@tonic-gate *cp++ = '\0';
15637c478bd9Sstevel@tonic-gate
15647c478bd9Sstevel@tonic-gate for (cpp = speeds; cpp < &speeds[NSPEEDS]; cpp++)
15657c478bd9Sstevel@tonic-gate if (strcmp(*cpp, speed) == 0) {
15667c478bd9Sstevel@tonic-gate (void) cfsetospeed(&tp, cpp-speeds);
15677c478bd9Sstevel@tonic-gate break;
15687c478bd9Sstevel@tonic-gate }
15697c478bd9Sstevel@tonic-gate }
15707c478bd9Sstevel@tonic-gate
15717c478bd9Sstevel@tonic-gate tp.c_lflag |= ECHO|ICANON;
15727c478bd9Sstevel@tonic-gate tp.c_iflag |= IGNPAR|ICRNL;
15737c478bd9Sstevel@tonic-gate
15747c478bd9Sstevel@tonic-gate (void) ioctl(0, TCSETS, &tp);
15757c478bd9Sstevel@tonic-gate
15767c478bd9Sstevel@tonic-gate }
15777c478bd9Sstevel@tonic-gate
15787c478bd9Sstevel@tonic-gate /*
15797c478bd9Sstevel@tonic-gate * Process_rlogin - Does the work that rlogin and telnet
15807c478bd9Sstevel@tonic-gate * need done
15817c478bd9Sstevel@tonic-gate */
15827c478bd9Sstevel@tonic-gate static void
process_rlogin(void)15837c478bd9Sstevel@tonic-gate process_rlogin(void)
15847c478bd9Sstevel@tonic-gate {
15857c478bd9Sstevel@tonic-gate /*
15867c478bd9Sstevel@tonic-gate * If a Kerberized rlogin was initiated, then these fields
15877c478bd9Sstevel@tonic-gate * must be read by rlogin daemon itself and passed down via
15887c478bd9Sstevel@tonic-gate * cmd line args.
15897c478bd9Sstevel@tonic-gate */
15907c478bd9Sstevel@tonic-gate if (!Uflag && !strlen(rusername))
15917c478bd9Sstevel@tonic-gate getstr(rusername, sizeof (rusername), "remuser");
15927c478bd9Sstevel@tonic-gate if (!strlen(lusername))
15937c478bd9Sstevel@tonic-gate getstr(lusername, sizeof (lusername), "locuser");
15947c478bd9Sstevel@tonic-gate if (!tflag && !strlen(terminal))
15957c478bd9Sstevel@tonic-gate getstr(terminal, sizeof (terminal), "Terminal type");
15967c478bd9Sstevel@tonic-gate
15977c478bd9Sstevel@tonic-gate if (strlen(terminal))
15987c478bd9Sstevel@tonic-gate doremoteterm(terminal);
15997c478bd9Sstevel@tonic-gate
16007c478bd9Sstevel@tonic-gate /* fflag has precedence over stuff passed by rlogind */
16017c478bd9Sstevel@tonic-gate if (fflag || getuid()) {
16027c478bd9Sstevel@tonic-gate pwd = &nouser;
16037c478bd9Sstevel@tonic-gate return;
16047c478bd9Sstevel@tonic-gate } else {
16057c478bd9Sstevel@tonic-gate if (pam_set_item(pamh, PAM_USER, lusername) != PAM_SUCCESS)
16067c478bd9Sstevel@tonic-gate login_exit(1);
16077c478bd9Sstevel@tonic-gate
16087c478bd9Sstevel@tonic-gate pwd = getpwnam(lusername);
16097c478bd9Sstevel@tonic-gate if (pwd == NULL) {
16107c478bd9Sstevel@tonic-gate pwd = &nouser;
16117c478bd9Sstevel@tonic-gate return;
16127c478bd9Sstevel@tonic-gate }
16137c478bd9Sstevel@tonic-gate }
16147c478bd9Sstevel@tonic-gate
16157c478bd9Sstevel@tonic-gate /*
16167c478bd9Sstevel@tonic-gate * Update PAM on the user name
16177c478bd9Sstevel@tonic-gate */
16187c478bd9Sstevel@tonic-gate if (strlen(lusername) &&
16197c478bd9Sstevel@tonic-gate pam_set_item(pamh, PAM_USER, lusername) != PAM_SUCCESS)
16207c478bd9Sstevel@tonic-gate login_exit(1);
16217c478bd9Sstevel@tonic-gate
16227c478bd9Sstevel@tonic-gate if (strlen(rusername) &&
16237c478bd9Sstevel@tonic-gate pam_set_item(pamh, PAM_RUSER, rusername) != PAM_SUCCESS)
16247c478bd9Sstevel@tonic-gate login_exit(1);
16257c478bd9Sstevel@tonic-gate
16267c478bd9Sstevel@tonic-gate SCPYL(user_name, lusername);
16277c478bd9Sstevel@tonic-gate envp = &zero;
16287c478bd9Sstevel@tonic-gate lusername[0] = '\0';
16297c478bd9Sstevel@tonic-gate }
16307c478bd9Sstevel@tonic-gate
16317c478bd9Sstevel@tonic-gate /*
16327c478bd9Sstevel@tonic-gate * *** Account validation routines ***
16337c478bd9Sstevel@tonic-gate *
16347c478bd9Sstevel@tonic-gate */
16357c478bd9Sstevel@tonic-gate
16367c478bd9Sstevel@tonic-gate /*
16377c478bd9Sstevel@tonic-gate * validate_account - This is the PAM version of validate.
16387c478bd9Sstevel@tonic-gate */
16397c478bd9Sstevel@tonic-gate
16407c478bd9Sstevel@tonic-gate static void
validate_account(void)16417c478bd9Sstevel@tonic-gate validate_account(void)
16427c478bd9Sstevel@tonic-gate {
16437c478bd9Sstevel@tonic-gate int error;
16447c478bd9Sstevel@tonic-gate int flag;
16457c478bd9Sstevel@tonic-gate int tries; /* new password retries */
16467c478bd9Sstevel@tonic-gate
16477c478bd9Sstevel@tonic-gate (void) alarm(0); /* give user time to come up with password */
16487c478bd9Sstevel@tonic-gate
16497c478bd9Sstevel@tonic-gate check_log();
16507c478bd9Sstevel@tonic-gate
16517c478bd9Sstevel@tonic-gate if (Passreqflag)
16527c478bd9Sstevel@tonic-gate flag = PAM_DISALLOW_NULL_AUTHTOK;
16537c478bd9Sstevel@tonic-gate else
16547c478bd9Sstevel@tonic-gate flag = 0;
16557c478bd9Sstevel@tonic-gate
16567c478bd9Sstevel@tonic-gate if ((error = pam_acct_mgmt(pamh, flag)) != PAM_SUCCESS) {
16577c478bd9Sstevel@tonic-gate if (error == PAM_NEW_AUTHTOK_REQD) {
16587c478bd9Sstevel@tonic-gate tries = 1;
16597c478bd9Sstevel@tonic-gate error = PAM_AUTHTOK_ERR;
16607c478bd9Sstevel@tonic-gate while (error == PAM_AUTHTOK_ERR &&
16617c478bd9Sstevel@tonic-gate tries <= DEF_ATTEMPTS) {
16627c478bd9Sstevel@tonic-gate if (tries > 1)
16637c478bd9Sstevel@tonic-gate (void) printf("Try again\n\n");
16647c478bd9Sstevel@tonic-gate
16657c478bd9Sstevel@tonic-gate (void) printf("Choose a new password.\n");
16667c478bd9Sstevel@tonic-gate
1667f00e6aa6Sdarrenm error = pam_chauthtok(pamh,
1668f00e6aa6Sdarrenm PAM_CHANGE_EXPIRED_AUTHTOK);
16697c478bd9Sstevel@tonic-gate if (error == PAM_TRY_AGAIN) {
16707c478bd9Sstevel@tonic-gate (void) sleep(1);
1671f00e6aa6Sdarrenm error = pam_chauthtok(pamh,
1672f00e6aa6Sdarrenm PAM_CHANGE_EXPIRED_AUTHTOK);
16737c478bd9Sstevel@tonic-gate }
16747c478bd9Sstevel@tonic-gate tries++;
16757c478bd9Sstevel@tonic-gate }
16767c478bd9Sstevel@tonic-gate
16777c478bd9Sstevel@tonic-gate if (error != PAM_SUCCESS) {
16787c478bd9Sstevel@tonic-gate if (dosyslog)
16797c478bd9Sstevel@tonic-gate syslog(LOG_CRIT,
16807c478bd9Sstevel@tonic-gate "change password failure: %s",
16817c478bd9Sstevel@tonic-gate pam_strerror(pamh, error));
16827c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + error;
16837c478bd9Sstevel@tonic-gate login_exit(1);
16847c478bd9Sstevel@tonic-gate } else {
16857c478bd9Sstevel@tonic-gate audit_success(ADT_passwd, pwd, zone_name);
16867c478bd9Sstevel@tonic-gate }
16877c478bd9Sstevel@tonic-gate } else {
16887c478bd9Sstevel@tonic-gate (void) printf(incorrectmsg);
16897c478bd9Sstevel@tonic-gate
16907c478bd9Sstevel@tonic-gate if (dosyslog)
16917c478bd9Sstevel@tonic-gate syslog(LOG_CRIT,
16927c478bd9Sstevel@tonic-gate "login account failure: %s",
16937c478bd9Sstevel@tonic-gate pam_strerror(pamh, error));
16947c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + error;
16957c478bd9Sstevel@tonic-gate login_exit(1);
16967c478bd9Sstevel@tonic-gate }
16977c478bd9Sstevel@tonic-gate }
16987c478bd9Sstevel@tonic-gate }
16997c478bd9Sstevel@tonic-gate
17007c478bd9Sstevel@tonic-gate /*
17017c478bd9Sstevel@tonic-gate * Check_log - This is really a hack because PAM checks the log, but login
17027c478bd9Sstevel@tonic-gate * wants to know if the log is okay and PAM doesn't have
17037c478bd9Sstevel@tonic-gate * a module independent way of handing this info back.
17047c478bd9Sstevel@tonic-gate */
17057c478bd9Sstevel@tonic-gate
17067c478bd9Sstevel@tonic-gate static void
check_log(void)17077c478bd9Sstevel@tonic-gate check_log(void)
17087c478bd9Sstevel@tonic-gate {
17097c478bd9Sstevel@tonic-gate int fdl;
17107c478bd9Sstevel@tonic-gate long long offset;
17117c478bd9Sstevel@tonic-gate
17127c478bd9Sstevel@tonic-gate offset = (long long) pwd->pw_uid * (long long) sizeof (struct lastlog);
17137c478bd9Sstevel@tonic-gate
17147c478bd9Sstevel@tonic-gate if ((fdl = open(LASTLOG, O_RDWR|O_CREAT, 0444)) >= 0) {
17157c478bd9Sstevel@tonic-gate if (llseek(fdl, offset, SEEK_SET) == offset &&
17167c478bd9Sstevel@tonic-gate read(fdl, (char *)&ll, sizeof (ll)) == sizeof (ll) &&
17177c478bd9Sstevel@tonic-gate ll.ll_time != 0)
17187c478bd9Sstevel@tonic-gate lastlogok = 1;
17197c478bd9Sstevel@tonic-gate (void) close(fdl);
17207c478bd9Sstevel@tonic-gate }
17217c478bd9Sstevel@tonic-gate }
17227c478bd9Sstevel@tonic-gate
17237c478bd9Sstevel@tonic-gate /*
17247c478bd9Sstevel@tonic-gate * chdir_to_dir_user - Now chdir after setuid/setgid have happened to
17257c478bd9Sstevel@tonic-gate * place us in the user's home directory just in
17267c478bd9Sstevel@tonic-gate * case it was protected and the first chdir failed.
17277c478bd9Sstevel@tonic-gate * No chdir errors should happen at this point because
17287c478bd9Sstevel@tonic-gate * all failures should have happened on the first
17297c478bd9Sstevel@tonic-gate * time around.
17307c478bd9Sstevel@tonic-gate */
17317c478bd9Sstevel@tonic-gate
17327c478bd9Sstevel@tonic-gate static void
chdir_to_dir_user(void)17337c478bd9Sstevel@tonic-gate chdir_to_dir_user(void)
17347c478bd9Sstevel@tonic-gate {
17357c478bd9Sstevel@tonic-gate if (chdir(pwd->pw_dir) < 0) {
17367c478bd9Sstevel@tonic-gate if (chdir("/") < 0) {
17377c478bd9Sstevel@tonic-gate (void) printf("No directory!\n");
17387c478bd9Sstevel@tonic-gate /*
17397c478bd9Sstevel@tonic-gate * This probably won't work since we can't get to /.
17407c478bd9Sstevel@tonic-gate */
17417c478bd9Sstevel@tonic-gate if (dosyslog) {
17427c478bd9Sstevel@tonic-gate if (remote_host[0]) {
17437c478bd9Sstevel@tonic-gate syslog(LOG_CRIT,
17447c478bd9Sstevel@tonic-gate "LOGIN FAILURES ON %s FROM %.*s ",
17457c478bd9Sstevel@tonic-gate " %.*s", ttyn, HMAX,
17467c478bd9Sstevel@tonic-gate remote_host, NMAX, pwd->pw_name);
17477c478bd9Sstevel@tonic-gate } else {
17487c478bd9Sstevel@tonic-gate syslog(LOG_CRIT,
17497c478bd9Sstevel@tonic-gate "LOGIN FAILURES ON %s, %.*s",
17507c478bd9Sstevel@tonic-gate ttyn, NMAX, pwd->pw_name);
17517c478bd9Sstevel@tonic-gate }
17527c478bd9Sstevel@tonic-gate }
17537c478bd9Sstevel@tonic-gate closelog();
17547c478bd9Sstevel@tonic-gate (void) sleep(Disabletime);
17557c478bd9Sstevel@tonic-gate exit(1);
17567c478bd9Sstevel@tonic-gate } else {
17577c478bd9Sstevel@tonic-gate (void) printf("No directory! Logging in with home=/\n");
17587c478bd9Sstevel@tonic-gate pwd->pw_dir = "/";
17597c478bd9Sstevel@tonic-gate }
17607c478bd9Sstevel@tonic-gate }
17617c478bd9Sstevel@tonic-gate }
17627c478bd9Sstevel@tonic-gate
17637c478bd9Sstevel@tonic-gate
17647c478bd9Sstevel@tonic-gate /*
17657c478bd9Sstevel@tonic-gate * login_authenticate - Performs the main authentication work
17667c478bd9Sstevel@tonic-gate * 1. Prints the login prompt
17677c478bd9Sstevel@tonic-gate * 2. Requests and verifys the password
17687c478bd9Sstevel@tonic-gate * 3. Checks the port password
17697c478bd9Sstevel@tonic-gate */
17707c478bd9Sstevel@tonic-gate
17717c478bd9Sstevel@tonic-gate static void
login_authenticate(void)1772032624d5Sbasabi login_authenticate(void)
17737c478bd9Sstevel@tonic-gate {
17747c478bd9Sstevel@tonic-gate char *user;
17757c478bd9Sstevel@tonic-gate int err;
17767c478bd9Sstevel@tonic-gate int login_successful = 0;
17777c478bd9Sstevel@tonic-gate
17787c478bd9Sstevel@tonic-gate do {
17797c478bd9Sstevel@tonic-gate /* if scheme broken, then nothing to do but quit */
17802a0352b4Sgww if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS)
17817c478bd9Sstevel@tonic-gate exit(1);
17827c478bd9Sstevel@tonic-gate
17837c478bd9Sstevel@tonic-gate /*
17847c478bd9Sstevel@tonic-gate * only get name from utility if it is not already
17857c478bd9Sstevel@tonic-gate * supplied by pam_start or a pam_set_item.
17867c478bd9Sstevel@tonic-gate */
17877c478bd9Sstevel@tonic-gate if (!user || !user[0]) {
17887c478bd9Sstevel@tonic-gate /* use call back to get user name */
17897c478bd9Sstevel@tonic-gate get_user_name();
17907c478bd9Sstevel@tonic-gate }
17917c478bd9Sstevel@tonic-gate
17927c478bd9Sstevel@tonic-gate err = verify_passwd();
17937c478bd9Sstevel@tonic-gate
17947c478bd9Sstevel@tonic-gate /*
17957c478bd9Sstevel@tonic-gate * If root login and not on system console then call exit(2)
17967c478bd9Sstevel@tonic-gate */
17977c478bd9Sstevel@tonic-gate check_for_console();
17987c478bd9Sstevel@tonic-gate
17997c478bd9Sstevel@tonic-gate switch (err) {
18007c478bd9Sstevel@tonic-gate case PAM_SUCCESS:
18017c478bd9Sstevel@tonic-gate case PAM_NEW_AUTHTOK_REQD:
18027c478bd9Sstevel@tonic-gate /*
18037c478bd9Sstevel@tonic-gate * Officially, pam_authenticate() shouldn't return this
18047c478bd9Sstevel@tonic-gate * but it's probably the right thing to return if
18057c478bd9Sstevel@tonic-gate * PAM_DISALLOW_NULL_AUTHTOK is set so the user will
18067c478bd9Sstevel@tonic-gate * be forced to change password later in this code.
18077c478bd9Sstevel@tonic-gate */
18087c478bd9Sstevel@tonic-gate count = 0;
18097c478bd9Sstevel@tonic-gate login_successful = 1;
18107c478bd9Sstevel@tonic-gate break;
18117c478bd9Sstevel@tonic-gate case PAM_MAXTRIES:
18127c478bd9Sstevel@tonic-gate count = retry;
18137c478bd9Sstevel@tonic-gate /*FALLTHROUGH*/
18147c478bd9Sstevel@tonic-gate case PAM_AUTH_ERR:
18157c478bd9Sstevel@tonic-gate case PAM_AUTHINFO_UNAVAIL:
18167c478bd9Sstevel@tonic-gate case PAM_USER_UNKNOWN:
18177c478bd9Sstevel@tonic-gate audit_failure(get_audit_id(), ADT_FAIL_PAM + err, pwd,
18187c478bd9Sstevel@tonic-gate remote_host, ttyn, zone_name);
18197c478bd9Sstevel@tonic-gate log_bad_attempts();
18207c478bd9Sstevel@tonic-gate break;
18217c478bd9Sstevel@tonic-gate case PAM_ABORT:
18227c478bd9Sstevel@tonic-gate log_bad_attempts();
18237c478bd9Sstevel@tonic-gate (void) sleep(Disabletime);
18247c478bd9Sstevel@tonic-gate (void) printf(incorrectmsg);
18257c478bd9Sstevel@tonic-gate
18267c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + err;
18277c478bd9Sstevel@tonic-gate login_exit(1);
18287c478bd9Sstevel@tonic-gate /*NOTREACHED*/
18297c478bd9Sstevel@tonic-gate default: /* Some other PAM error */
18307c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + err;
18317c478bd9Sstevel@tonic-gate login_exit(1);
18327c478bd9Sstevel@tonic-gate /*NOTREACHED*/
18337c478bd9Sstevel@tonic-gate }
18347c478bd9Sstevel@tonic-gate
18357c478bd9Sstevel@tonic-gate if (login_successful)
18367c478bd9Sstevel@tonic-gate break;
18377c478bd9Sstevel@tonic-gate
18387c478bd9Sstevel@tonic-gate /* sleep after bad passwd */
18397c478bd9Sstevel@tonic-gate if (count)
18407c478bd9Sstevel@tonic-gate (void) sleep(Sleeptime);
18417c478bd9Sstevel@tonic-gate (void) printf(incorrectmsg);
18427c478bd9Sstevel@tonic-gate /* force name to be null in this case */
18437c478bd9Sstevel@tonic-gate if (pam_set_item(pamh, PAM_USER, NULL) != PAM_SUCCESS)
18447c478bd9Sstevel@tonic-gate login_exit(1);
18457c478bd9Sstevel@tonic-gate if (pam_set_item(pamh, PAM_RUSER, NULL) != PAM_SUCCESS)
18467c478bd9Sstevel@tonic-gate login_exit(1);
18477c478bd9Sstevel@tonic-gate } while (count++ < retry);
18487c478bd9Sstevel@tonic-gate
18497c478bd9Sstevel@tonic-gate if (count >= retry) {
18507c478bd9Sstevel@tonic-gate audit_failure(get_audit_id(), ADT_FAIL_VALUE_MAX_TRIES, pwd,
18517c478bd9Sstevel@tonic-gate remote_host, ttyn, zone_name);
18527c478bd9Sstevel@tonic-gate /*
18537c478bd9Sstevel@tonic-gate * If logging is turned on, output the
18547c478bd9Sstevel@tonic-gate * string storage area to the log file,
18557c478bd9Sstevel@tonic-gate * and sleep for Disabletime
18567c478bd9Sstevel@tonic-gate * seconds before exiting.
18577c478bd9Sstevel@tonic-gate */
18587c478bd9Sstevel@tonic-gate if (writelog)
18597c478bd9Sstevel@tonic-gate badlogin();
18607c478bd9Sstevel@tonic-gate if (dosyslog) {
18617c478bd9Sstevel@tonic-gate if ((pwd = getpwnam(user_name)) != NULL) {
18627c478bd9Sstevel@tonic-gate if (remote_host[0]) {
18637c478bd9Sstevel@tonic-gate syslog(LOG_CRIT,
18642a0352b4Sgww "REPEATED LOGIN FAILURES ON %s "
18652a0352b4Sgww "FROM %.*s, %.*s",
18667c478bd9Sstevel@tonic-gate ttyn, HMAX, remote_host, NMAX,
18677c478bd9Sstevel@tonic-gate user_name);
18687c478bd9Sstevel@tonic-gate } else {
18697c478bd9Sstevel@tonic-gate syslog(LOG_CRIT,
18702a0352b4Sgww "REPEATED LOGIN FAILURES ON "
18712a0352b4Sgww "%s, %.*s",
18727c478bd9Sstevel@tonic-gate ttyn, NMAX, user_name);
18737c478bd9Sstevel@tonic-gate }
18747c478bd9Sstevel@tonic-gate } else {
18757c478bd9Sstevel@tonic-gate if (remote_host[0]) {
18767c478bd9Sstevel@tonic-gate syslog(LOG_CRIT,
18772a0352b4Sgww "REPEATED LOGIN FAILURES ON %s "
18782a0352b4Sgww "FROM %.*s",
18797c478bd9Sstevel@tonic-gate ttyn, HMAX, remote_host);
18807c478bd9Sstevel@tonic-gate } else {
18817c478bd9Sstevel@tonic-gate syslog(LOG_CRIT,
18822a0352b4Sgww "REPEATED LOGIN FAILURES ON %s",
18832a0352b4Sgww ttyn);
18847c478bd9Sstevel@tonic-gate }
18857c478bd9Sstevel@tonic-gate }
18867c478bd9Sstevel@tonic-gate }
18877c478bd9Sstevel@tonic-gate (void) sleep(Disabletime);
18887c478bd9Sstevel@tonic-gate exit(1);
18897c478bd9Sstevel@tonic-gate }
18907c478bd9Sstevel@tonic-gate
18917c478bd9Sstevel@tonic-gate }
18927c478bd9Sstevel@tonic-gate
18937c478bd9Sstevel@tonic-gate /*
18947c478bd9Sstevel@tonic-gate * *** Credential Related routines ***
18957c478bd9Sstevel@tonic-gate *
18967c478bd9Sstevel@tonic-gate */
18977c478bd9Sstevel@tonic-gate
18987c478bd9Sstevel@tonic-gate /*
18997c478bd9Sstevel@tonic-gate * setup_credentials - sets the group ID, initializes the groups
19007c478bd9Sstevel@tonic-gate * and sets up the secretkey.
19017c478bd9Sstevel@tonic-gate * Exits if a failure occurrs.
19027c478bd9Sstevel@tonic-gate */
19037c478bd9Sstevel@tonic-gate
19047c478bd9Sstevel@tonic-gate
19057c478bd9Sstevel@tonic-gate /*
19067c478bd9Sstevel@tonic-gate * setup_credentials - PAM does all the work for us on this one.
19077c478bd9Sstevel@tonic-gate */
19087c478bd9Sstevel@tonic-gate
19097c478bd9Sstevel@tonic-gate static void
setup_credentials(void)19107c478bd9Sstevel@tonic-gate setup_credentials(void)
19117c478bd9Sstevel@tonic-gate {
19127c478bd9Sstevel@tonic-gate int error = 0;
19137c478bd9Sstevel@tonic-gate
19147c478bd9Sstevel@tonic-gate /* set the real (and effective) GID */
19157c478bd9Sstevel@tonic-gate if (setgid(pwd->pw_gid) == -1) {
19167c478bd9Sstevel@tonic-gate login_exit(1);
19177c478bd9Sstevel@tonic-gate }
19187c478bd9Sstevel@tonic-gate
19197c478bd9Sstevel@tonic-gate /*
19207c478bd9Sstevel@tonic-gate * Initialize the supplementary group access list.
19217c478bd9Sstevel@tonic-gate */
19227c478bd9Sstevel@tonic-gate if ((user_name[0] == '\0') ||
19237c478bd9Sstevel@tonic-gate (initgroups(user_name, pwd->pw_gid) == -1)) {
19247c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_PROGRAM;
19257c478bd9Sstevel@tonic-gate login_exit(1);
19267c478bd9Sstevel@tonic-gate }
19277c478bd9Sstevel@tonic-gate
19281117ab72SJan Friedel if ((error = pam_setcred(pamh, zflag ? PAM_REINITIALIZE_CRED :
19291117ab72SJan Friedel PAM_ESTABLISH_CRED)) != PAM_SUCCESS) {
19307c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + error;
19317c478bd9Sstevel@tonic-gate login_exit(error);
19327c478bd9Sstevel@tonic-gate }
19337c478bd9Sstevel@tonic-gate
19347c478bd9Sstevel@tonic-gate /*
19357c478bd9Sstevel@tonic-gate * Record successful login and fork process that records logout.
19367c478bd9Sstevel@tonic-gate * We have to do this after setting credentials because pam_setcred()
19377c478bd9Sstevel@tonic-gate * loads key audit info into the cred, but before setuid() so audit
19387c478bd9Sstevel@tonic-gate * system calls will work.
19397c478bd9Sstevel@tonic-gate */
19407c478bd9Sstevel@tonic-gate audit_success(get_audit_id(), pwd, zone_name);
19417c478bd9Sstevel@tonic-gate }
19427c478bd9Sstevel@tonic-gate
19437c478bd9Sstevel@tonic-gate static uint_t
get_audit_id(void)1944032624d5Sbasabi get_audit_id(void)
1945032624d5Sbasabi {
19467c478bd9Sstevel@tonic-gate if (rflag)
19477c478bd9Sstevel@tonic-gate return (ADT_rlogin);
19487c478bd9Sstevel@tonic-gate else if (hflag)
19497c478bd9Sstevel@tonic-gate return (ADT_telnet);
19507c478bd9Sstevel@tonic-gate else if (zflag)
19517c478bd9Sstevel@tonic-gate return (ADT_zlogin);
19527c478bd9Sstevel@tonic-gate
19537c478bd9Sstevel@tonic-gate return (ADT_login);
19547c478bd9Sstevel@tonic-gate }
19557c478bd9Sstevel@tonic-gate
19567c478bd9Sstevel@tonic-gate /*
19577c478bd9Sstevel@tonic-gate *
19587c478bd9Sstevel@tonic-gate * *** Routines to get a new user set up and running ***
19597c478bd9Sstevel@tonic-gate *
19607c478bd9Sstevel@tonic-gate * Things to do when starting up a new user:
19617c478bd9Sstevel@tonic-gate * adjust_nice
19627c478bd9Sstevel@tonic-gate * update_utmpx_entry
19637c478bd9Sstevel@tonic-gate * establish_user_environment
19647c478bd9Sstevel@tonic-gate * print_banner
19657c478bd9Sstevel@tonic-gate * display_last_login_time
19667c478bd9Sstevel@tonic-gate * exec_the_shell
19677c478bd9Sstevel@tonic-gate *
19687c478bd9Sstevel@tonic-gate */
19697c478bd9Sstevel@tonic-gate
19707c478bd9Sstevel@tonic-gate
19717c478bd9Sstevel@tonic-gate /*
19727c478bd9Sstevel@tonic-gate * adjust_nice - Set the nice (process priority) value if the
19737c478bd9Sstevel@tonic-gate * gecos value contains an appropriate value.
19747c478bd9Sstevel@tonic-gate */
19757c478bd9Sstevel@tonic-gate
19767c478bd9Sstevel@tonic-gate static void
adjust_nice(void)19777c478bd9Sstevel@tonic-gate adjust_nice(void)
19787c478bd9Sstevel@tonic-gate {
19797c478bd9Sstevel@tonic-gate int pri, mflg, i;
19807c478bd9Sstevel@tonic-gate
19817c478bd9Sstevel@tonic-gate if (strncmp("pri=", pwd->pw_gecos, 4) == 0) {
19827c478bd9Sstevel@tonic-gate pri = 0;
19837c478bd9Sstevel@tonic-gate mflg = 0;
19847c478bd9Sstevel@tonic-gate i = 4;
19857c478bd9Sstevel@tonic-gate
19867c478bd9Sstevel@tonic-gate if (pwd->pw_gecos[i] == '-') {
19877c478bd9Sstevel@tonic-gate mflg++;
19887c478bd9Sstevel@tonic-gate i++;
19897c478bd9Sstevel@tonic-gate }
19907c478bd9Sstevel@tonic-gate
19917c478bd9Sstevel@tonic-gate while (pwd->pw_gecos[i] >= '0' && pwd->pw_gecos[i] <= '9')
19927c478bd9Sstevel@tonic-gate pri = (pri * 10) + pwd->pw_gecos[i++] - '0';
19937c478bd9Sstevel@tonic-gate
19947c478bd9Sstevel@tonic-gate if (mflg)
19957c478bd9Sstevel@tonic-gate pri = -pri;
19967c478bd9Sstevel@tonic-gate
19977c478bd9Sstevel@tonic-gate (void) nice(pri);
19987c478bd9Sstevel@tonic-gate }
19997c478bd9Sstevel@tonic-gate }
20007c478bd9Sstevel@tonic-gate
20017c478bd9Sstevel@tonic-gate /*
20027c478bd9Sstevel@tonic-gate * update_utmpx_entry - Searchs for the correct utmpx entry, making an
20037c478bd9Sstevel@tonic-gate * entry there if it finds one, otherwise exits.
20047c478bd9Sstevel@tonic-gate */
20057c478bd9Sstevel@tonic-gate
20067c478bd9Sstevel@tonic-gate static void
update_utmpx_entry(int sublogin)20077c478bd9Sstevel@tonic-gate update_utmpx_entry(int sublogin)
20087c478bd9Sstevel@tonic-gate {
20097c478bd9Sstevel@tonic-gate int err;
20107c478bd9Sstevel@tonic-gate char *user;
20117c478bd9Sstevel@tonic-gate static char *errmsg = "No utmpx entry. "
20127c478bd9Sstevel@tonic-gate "You must exec \"login\" from the lowest level \"shell\".";
20137c478bd9Sstevel@tonic-gate int tmplen;
20147c478bd9Sstevel@tonic-gate struct utmpx *u = (struct utmpx *)0;
20157c478bd9Sstevel@tonic-gate struct utmpx utmpx;
20167c478bd9Sstevel@tonic-gate char *ttyntail;
20177c478bd9Sstevel@tonic-gate
20187c478bd9Sstevel@tonic-gate /*
20197c478bd9Sstevel@tonic-gate * If we're not a sublogin then
20207c478bd9Sstevel@tonic-gate * we'll get an error back if our PID doesn't match the PID of the
20217c478bd9Sstevel@tonic-gate * entry we are updating, otherwise if its a sublogin the flags
20227c478bd9Sstevel@tonic-gate * field is set to 0, which means we just write a matching entry
20237c478bd9Sstevel@tonic-gate * (without checking the pid), or a new entry if an entry doesn't
20247c478bd9Sstevel@tonic-gate * exist.
20257c478bd9Sstevel@tonic-gate */
20267c478bd9Sstevel@tonic-gate
20277c478bd9Sstevel@tonic-gate if ((err = pam_open_session(pamh, 0)) != PAM_SUCCESS) {
20287c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + err;
20297c478bd9Sstevel@tonic-gate login_exit(1);
20307c478bd9Sstevel@tonic-gate }
20317c478bd9Sstevel@tonic-gate
20327c478bd9Sstevel@tonic-gate if ((err = pam_get_item(pamh, PAM_USER, (void **) &user)) !=
20337c478bd9Sstevel@tonic-gate PAM_SUCCESS) {
20347c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + err;
20357c478bd9Sstevel@tonic-gate login_exit(1);
20367c478bd9Sstevel@tonic-gate }
20377c478bd9Sstevel@tonic-gate
20387c478bd9Sstevel@tonic-gate (void) memset((void *)&utmpx, 0, sizeof (utmpx));
20397c478bd9Sstevel@tonic-gate (void) time(&utmpx.ut_tv.tv_sec);
20407c478bd9Sstevel@tonic-gate utmpx.ut_pid = getpid();
20417c478bd9Sstevel@tonic-gate
20427c478bd9Sstevel@tonic-gate if (rflag || hflag) {
20437c478bd9Sstevel@tonic-gate SCPYN(utmpx.ut_host, remote_host);
20447c478bd9Sstevel@tonic-gate tmplen = strlen(remote_host) + 1;
20457c478bd9Sstevel@tonic-gate if (tmplen < sizeof (utmpx.ut_host))
20467c478bd9Sstevel@tonic-gate utmpx.ut_syslen = tmplen;
20477c478bd9Sstevel@tonic-gate else
20487c478bd9Sstevel@tonic-gate utmpx.ut_syslen = sizeof (utmpx.ut_host);
20497c478bd9Sstevel@tonic-gate } else if (zflag) {
20507c478bd9Sstevel@tonic-gate /*
20517c478bd9Sstevel@tonic-gate * If this is a login from another zone, put the
20527c478bd9Sstevel@tonic-gate * zone:<zonename> string in the utmpx entry.
20537c478bd9Sstevel@tonic-gate */
20547c478bd9Sstevel@tonic-gate SCPYN(utmpx.ut_host, zone_name);
20557c478bd9Sstevel@tonic-gate tmplen = strlen(zone_name) + 1;
20567c478bd9Sstevel@tonic-gate if (tmplen < sizeof (utmpx.ut_host))
20577c478bd9Sstevel@tonic-gate utmpx.ut_syslen = tmplen;
20587c478bd9Sstevel@tonic-gate else
20597c478bd9Sstevel@tonic-gate utmpx.ut_syslen = sizeof (utmpx.ut_host);
20607c478bd9Sstevel@tonic-gate } else {
20617c478bd9Sstevel@tonic-gate utmpx.ut_syslen = 0;
20627c478bd9Sstevel@tonic-gate }
20637c478bd9Sstevel@tonic-gate
20647c478bd9Sstevel@tonic-gate SCPYN(utmpx.ut_user, user);
20657c478bd9Sstevel@tonic-gate
20667c478bd9Sstevel@tonic-gate /* skip over "/dev/" */
20677c478bd9Sstevel@tonic-gate ttyntail = basename(ttyn);
20687c478bd9Sstevel@tonic-gate
20697c478bd9Sstevel@tonic-gate while ((u = getutxent()) != NULL) {
20707c478bd9Sstevel@tonic-gate if ((u->ut_type == INIT_PROCESS ||
20717c478bd9Sstevel@tonic-gate u->ut_type == LOGIN_PROCESS ||
20727c478bd9Sstevel@tonic-gate u->ut_type == USER_PROCESS) &&
20737c478bd9Sstevel@tonic-gate ((sublogin && strncmp(u->ut_line, ttyntail,
20747c478bd9Sstevel@tonic-gate sizeof (u->ut_line)) == 0) ||
2075f0243e0aSrz201010 u->ut_pid == login_pid)) {
20767c478bd9Sstevel@tonic-gate SCPYN(utmpx.ut_line, (ttyn+sizeof ("/dev/")-1));
20777c478bd9Sstevel@tonic-gate (void) memcpy(utmpx.ut_id, u->ut_id,
20787c478bd9Sstevel@tonic-gate sizeof (utmpx.ut_id));
20797c478bd9Sstevel@tonic-gate utmpx.ut_exit.e_exit = u->ut_exit.e_exit;
20807c478bd9Sstevel@tonic-gate utmpx.ut_type = USER_PROCESS;
20817c478bd9Sstevel@tonic-gate (void) pututxline(&utmpx);
20827c478bd9Sstevel@tonic-gate break;
20837c478bd9Sstevel@tonic-gate }
20847c478bd9Sstevel@tonic-gate }
20857c478bd9Sstevel@tonic-gate endutxent();
20867c478bd9Sstevel@tonic-gate
20877c478bd9Sstevel@tonic-gate if (u == (struct utmpx *)NULL) {
20887c478bd9Sstevel@tonic-gate if (!sublogin) {
20897c478bd9Sstevel@tonic-gate /*
20907c478bd9Sstevel@tonic-gate * no utmpx entry already setup
20917c478bd9Sstevel@tonic-gate * (init or rlogind/telnetd)
20927c478bd9Sstevel@tonic-gate */
20937c478bd9Sstevel@tonic-gate (void) puts(errmsg);
20947c478bd9Sstevel@tonic-gate
20957c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_PROGRAM;
20967c478bd9Sstevel@tonic-gate login_exit(1);
20977c478bd9Sstevel@tonic-gate }
20987c478bd9Sstevel@tonic-gate } else {
20997c478bd9Sstevel@tonic-gate /* Now attempt to write out this entry to the wtmp file if */
21007c478bd9Sstevel@tonic-gate /* we were successful in getting it from the utmpx file and */
21017c478bd9Sstevel@tonic-gate /* the wtmp file exists. */
21027c478bd9Sstevel@tonic-gate updwtmpx(WTMPX_FILE, &utmpx);
21037c478bd9Sstevel@tonic-gate }
21047c478bd9Sstevel@tonic-gate }
21057c478bd9Sstevel@tonic-gate
21067c478bd9Sstevel@tonic-gate
21077c478bd9Sstevel@tonic-gate
21087c478bd9Sstevel@tonic-gate /*
21097c478bd9Sstevel@tonic-gate * process_chroot_logins - Chroots to the specified subdirectory and
21107c478bd9Sstevel@tonic-gate * re executes login.
21117c478bd9Sstevel@tonic-gate */
21127c478bd9Sstevel@tonic-gate
21137c478bd9Sstevel@tonic-gate static int
process_chroot_logins(void)21147c478bd9Sstevel@tonic-gate process_chroot_logins(void)
21157c478bd9Sstevel@tonic-gate {
21167c478bd9Sstevel@tonic-gate /*
21177c478bd9Sstevel@tonic-gate * If the shell field starts with a '*', do a chroot to the home
21187c478bd9Sstevel@tonic-gate * directory and perform a new login.
21197c478bd9Sstevel@tonic-gate */
21207c478bd9Sstevel@tonic-gate
21217c478bd9Sstevel@tonic-gate if (*pwd->pw_shell == '*') {
21227c478bd9Sstevel@tonic-gate (void) pam_end(pamh, PAM_SUCCESS); /* Done using PAM */
21237c478bd9Sstevel@tonic-gate pamh = NULL; /* really done */
21247c478bd9Sstevel@tonic-gate if (chroot(pwd->pw_dir) < 0) {
21257c478bd9Sstevel@tonic-gate (void) printf("No Root Directory\n");
21267c478bd9Sstevel@tonic-gate
21277c478bd9Sstevel@tonic-gate audit_failure(get_audit_id(),
21287c478bd9Sstevel@tonic-gate ADT_FAIL_VALUE_CHDIR_FAILED,
21297c478bd9Sstevel@tonic-gate pwd, remote_host, ttyn, zone_name);
21307c478bd9Sstevel@tonic-gate
21317c478bd9Sstevel@tonic-gate return (ERROR);
21327c478bd9Sstevel@tonic-gate }
21337c478bd9Sstevel@tonic-gate /*
21347c478bd9Sstevel@tonic-gate * Set the environment flag <!sublogin> so that the next login
21357c478bd9Sstevel@tonic-gate * knows that it is a sublogin.
21367c478bd9Sstevel@tonic-gate */
21377c478bd9Sstevel@tonic-gate envinit[0] = SUBLOGIN;
21387c478bd9Sstevel@tonic-gate envinit[1] = (char *)NULL;
21397c478bd9Sstevel@tonic-gate (void) printf("Subsystem root: %s\n", pwd->pw_dir);
21407c478bd9Sstevel@tonic-gate (void) execle("/usr/bin/login", "login", (char *)0,
21417c478bd9Sstevel@tonic-gate &envinit[0]);
21427c478bd9Sstevel@tonic-gate (void) execle("/etc/login", "login", (char *)0, &envinit[0]);
21437c478bd9Sstevel@tonic-gate (void) printf("No /usr/bin/login or /etc/login on root\n");
21447c478bd9Sstevel@tonic-gate
21457c478bd9Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_PROGRAM;
21467c478bd9Sstevel@tonic-gate
21477c478bd9Sstevel@tonic-gate login_exit(1);
21487c478bd9Sstevel@tonic-gate }
21497c478bd9Sstevel@tonic-gate return (OK);
21507c478bd9Sstevel@tonic-gate }
21517c478bd9Sstevel@tonic-gate
21527c478bd9Sstevel@tonic-gate /*
21537c478bd9Sstevel@tonic-gate * establish_user_environment - Set up the new users enviornment
21547c478bd9Sstevel@tonic-gate */
21557c478bd9Sstevel@tonic-gate
21567c478bd9Sstevel@tonic-gate static void
establish_user_environment(char ** renvp)21577c478bd9Sstevel@tonic-gate establish_user_environment(char **renvp)
21587c478bd9Sstevel@tonic-gate {
21597c478bd9Sstevel@tonic-gate int i, j, k, l_index, length, idx = 0;
21607c478bd9Sstevel@tonic-gate char *endptr;
21617c478bd9Sstevel@tonic-gate char **lenvp;
21627c478bd9Sstevel@tonic-gate char **pam_env;
21637c478bd9Sstevel@tonic-gate
21647c478bd9Sstevel@tonic-gate lenvp = environ;
21657c478bd9Sstevel@tonic-gate while (*lenvp++)
21667c478bd9Sstevel@tonic-gate ;
21677c478bd9Sstevel@tonic-gate
21687c478bd9Sstevel@tonic-gate /* count the number of PAM environment variables set by modules */
21697c478bd9Sstevel@tonic-gate if ((pam_env = pam_getenvlist(pamh)) != 0) {
21707c478bd9Sstevel@tonic-gate for (idx = 0; pam_env[idx] != 0; idx++)
21717c478bd9Sstevel@tonic-gate ;
21727c478bd9Sstevel@tonic-gate }
21737c478bd9Sstevel@tonic-gate
21742a0352b4Sgww envinit = (char **)calloc(lenvp - environ + 10 + MAXARGS + idx,
21752a0352b4Sgww sizeof (char *));
21767c478bd9Sstevel@tonic-gate if (envinit == NULL) {
21777c478bd9Sstevel@tonic-gate (void) printf("Calloc failed - out of swap space.\n");
21787c478bd9Sstevel@tonic-gate login_exit(8);
21797c478bd9Sstevel@tonic-gate }
21807c478bd9Sstevel@tonic-gate
21817c478bd9Sstevel@tonic-gate /*
21827c478bd9Sstevel@tonic-gate * add PAM environment variables first so they
21837c478bd9Sstevel@tonic-gate * can be overwritten at login's discretion.
21847c478bd9Sstevel@tonic-gate * check for illegal environment variables.
21857c478bd9Sstevel@tonic-gate */
21867c478bd9Sstevel@tonic-gate idx = 0; basicenv = 0;
21877c478bd9Sstevel@tonic-gate if (pam_env != 0) {
21887c478bd9Sstevel@tonic-gate while (pam_env[idx] != 0) {
21897c478bd9Sstevel@tonic-gate if (legalenvvar(pam_env[idx])) {
21907c478bd9Sstevel@tonic-gate envinit[basicenv] = pam_env[idx];
21917c478bd9Sstevel@tonic-gate basicenv++;
21927c478bd9Sstevel@tonic-gate }
21937c478bd9Sstevel@tonic-gate idx++;
21947c478bd9Sstevel@tonic-gate }
21957c478bd9Sstevel@tonic-gate }
21967c478bd9Sstevel@tonic-gate (void) memcpy(&envinit[basicenv], newenv, sizeof (newenv));
21977c478bd9Sstevel@tonic-gate
21987c478bd9Sstevel@tonic-gate /* Set up environment */
21997c478bd9Sstevel@tonic-gate if (rflag) {
22007c478bd9Sstevel@tonic-gate ENVSTRNCAT(term, terminal);
22017c478bd9Sstevel@tonic-gate } else if (hflag) {
22027c478bd9Sstevel@tonic-gate if (strlen(terminal)) {
22037c478bd9Sstevel@tonic-gate ENVSTRNCAT(term, terminal);
22047c478bd9Sstevel@tonic-gate }
22057c478bd9Sstevel@tonic-gate } else {
22067c478bd9Sstevel@tonic-gate char *tp = getenv("TERM");
22077c478bd9Sstevel@tonic-gate
22087c478bd9Sstevel@tonic-gate if ((tp != NULL) && (*tp != '\0'))
22097c478bd9Sstevel@tonic-gate ENVSTRNCAT(term, tp);
22107c478bd9Sstevel@tonic-gate }
22117c478bd9Sstevel@tonic-gate
22127c478bd9Sstevel@tonic-gate ENVSTRNCAT(logname, pwd->pw_name);
22137c478bd9Sstevel@tonic-gate
22147c478bd9Sstevel@tonic-gate /*
22157c478bd9Sstevel@tonic-gate * There are three places to get timezone info. init.c sets
2216*052519c2SGarrett D'Amore * TZ if the file /etc/default/init contains a value for TZ.
22177c478bd9Sstevel@tonic-gate * login.c looks in the file /etc/default/login for a
22187c478bd9Sstevel@tonic-gate * variable called TIMEZONE being set. If TIMEZONE has a
22197c478bd9Sstevel@tonic-gate * value, TZ is set to that value; no environment variable
22207c478bd9Sstevel@tonic-gate * TIMEZONE is set, only TZ. If neither of these methods
22217c478bd9Sstevel@tonic-gate * work to set TZ, then the library routines will default
22227c478bd9Sstevel@tonic-gate * to using the file /usr/lib/locale/TZ/localtime.
22237c478bd9Sstevel@tonic-gate *
2224*052519c2SGarrett D'Amore * There is a priority set up here. If /etc/default/init has
22257c478bd9Sstevel@tonic-gate * a value for TZ, that value remains top priority. If the
22267c478bd9Sstevel@tonic-gate * file /etc/default/login has TIMEZONE set, that has second
22277c478bd9Sstevel@tonic-gate * highest priority not overriding the value of TZ in
2228*052519c2SGarrett D'Amore * /etc/default/init. The reason for this priority is that the
2229*052519c2SGarrett D'Amore * file /etc/default/init is supposed to be sourced by
22307c478bd9Sstevel@tonic-gate * /etc/profile. We are doing the "sourcing" prematurely in
22317c478bd9Sstevel@tonic-gate * init.c. Additionally, a login C shell doesn't source the
2232*052519c2SGarrett D'Amore * file /etc/profile thus not sourcing /etc/default/init thus not
22337c478bd9Sstevel@tonic-gate * allowing an adminstrator to globally set TZ for all users
22347c478bd9Sstevel@tonic-gate */
22357c478bd9Sstevel@tonic-gate if (Def_tz != NULL) /* Is there a TZ from defaults/login? */
22367c478bd9Sstevel@tonic-gate tmp_tz = Def_tz;
22377c478bd9Sstevel@tonic-gate
22387c478bd9Sstevel@tonic-gate if ((Def_tz = getenv("TZ")) != NULL) {
22397c478bd9Sstevel@tonic-gate ENVSTRNCAT(timez, Def_tz);
22407c478bd9Sstevel@tonic-gate } else if (tmp_tz != NULL) {
22417c478bd9Sstevel@tonic-gate Def_tz = tmp_tz;
22427c478bd9Sstevel@tonic-gate ENVSTRNCAT(timez, Def_tz);
22437c478bd9Sstevel@tonic-gate }
22447c478bd9Sstevel@tonic-gate
22457c478bd9Sstevel@tonic-gate if (Def_hertz == NULL)
22467c478bd9Sstevel@tonic-gate (void) sprintf(hertz + strlen(hertz), "%lu", HZ);
22477c478bd9Sstevel@tonic-gate else
22487c478bd9Sstevel@tonic-gate ENVSTRNCAT(hertz, Def_hertz);
22497c478bd9Sstevel@tonic-gate
22507c478bd9Sstevel@tonic-gate if (Def_path == NULL)
22517c478bd9Sstevel@tonic-gate (void) strlcat(path, DEF_PATH, sizeof (path));
22527c478bd9Sstevel@tonic-gate else
22537c478bd9Sstevel@tonic-gate ENVSTRNCAT(path, Def_path);
22547c478bd9Sstevel@tonic-gate
22557c478bd9Sstevel@tonic-gate ENVSTRNCAT(home, pwd->pw_dir);
22567c478bd9Sstevel@tonic-gate
22577c478bd9Sstevel@tonic-gate /*
22587c478bd9Sstevel@tonic-gate * Find the end of the basic environment
22597c478bd9Sstevel@tonic-gate */
22607c478bd9Sstevel@tonic-gate for (basicenv = 0; envinit[basicenv] != NULL; basicenv++)
22617c478bd9Sstevel@tonic-gate ;
22627c478bd9Sstevel@tonic-gate
22637c478bd9Sstevel@tonic-gate /*
22647c478bd9Sstevel@tonic-gate * If TZ has a value, add it.
22657c478bd9Sstevel@tonic-gate */
22667c478bd9Sstevel@tonic-gate if (strcmp(timez, "TZ=") != 0)
22677c478bd9Sstevel@tonic-gate envinit[basicenv++] = timez;
22687c478bd9Sstevel@tonic-gate
22697c478bd9Sstevel@tonic-gate if (*pwd->pw_shell == '\0') {
22707c478bd9Sstevel@tonic-gate /*
22717c478bd9Sstevel@tonic-gate * If possible, use the primary default shell,
22727c478bd9Sstevel@tonic-gate * otherwise, use the secondary one.
22737c478bd9Sstevel@tonic-gate */
22747c478bd9Sstevel@tonic-gate if (access(SHELL, X_OK) == 0)
22757c478bd9Sstevel@tonic-gate pwd->pw_shell = SHELL;
22767c478bd9Sstevel@tonic-gate else
22777c478bd9Sstevel@tonic-gate pwd->pw_shell = SHELL2;
22787c478bd9Sstevel@tonic-gate } else if (Altshell != NULL && strcmp(Altshell, "YES") == 0) {
22797c478bd9Sstevel@tonic-gate envinit[basicenv++] = shell;
22807c478bd9Sstevel@tonic-gate ENVSTRNCAT(shell, pwd->pw_shell);
22817c478bd9Sstevel@tonic-gate }
22827c478bd9Sstevel@tonic-gate
22837c478bd9Sstevel@tonic-gate #ifndef NO_MAIL
22847c478bd9Sstevel@tonic-gate envinit[basicenv++] = mail;
22857c478bd9Sstevel@tonic-gate (void) strlcat(mail, pwd->pw_name, sizeof (mail));
22867c478bd9Sstevel@tonic-gate #endif
22877c478bd9Sstevel@tonic-gate
22887c478bd9Sstevel@tonic-gate /*
22897c478bd9Sstevel@tonic-gate * Pick up locale environment variables, if any.
22907c478bd9Sstevel@tonic-gate */
22917c478bd9Sstevel@tonic-gate lenvp = renvp;
22927c478bd9Sstevel@tonic-gate while (*lenvp != NULL) {
22937c478bd9Sstevel@tonic-gate j = 0;
22947c478bd9Sstevel@tonic-gate while (localeenv[j] != 0) {
22957c478bd9Sstevel@tonic-gate /*
22967c478bd9Sstevel@tonic-gate * locale_envmatch() returns 1 if
22977c478bd9Sstevel@tonic-gate * *lenvp is localenev[j] and valid.
22987c478bd9Sstevel@tonic-gate */
22997c478bd9Sstevel@tonic-gate if (locale_envmatch(localeenv[j], *lenvp) == 1) {
23007c478bd9Sstevel@tonic-gate envinit[basicenv++] = *lenvp;
23017c478bd9Sstevel@tonic-gate break;
23027c478bd9Sstevel@tonic-gate }
23037c478bd9Sstevel@tonic-gate j++;
23047c478bd9Sstevel@tonic-gate }
23057c478bd9Sstevel@tonic-gate lenvp++;
23067c478bd9Sstevel@tonic-gate }
23077c478bd9Sstevel@tonic-gate
23087c478bd9Sstevel@tonic-gate /*
23097c478bd9Sstevel@tonic-gate * If '-p' flag, then try to pass on allowable environment
23107c478bd9Sstevel@tonic-gate * variables. Note that by processing this first, what is
23117c478bd9Sstevel@tonic-gate * passed on the final "login:" line may over-ride the invocation
23127c478bd9Sstevel@tonic-gate * values. XXX is this correct?
23137c478bd9Sstevel@tonic-gate */
23147c478bd9Sstevel@tonic-gate if (pflag) {
23157c478bd9Sstevel@tonic-gate for (lenvp = renvp; *lenvp; lenvp++) {
23167c478bd9Sstevel@tonic-gate if (!legalenvvar(*lenvp)) {
23177c478bd9Sstevel@tonic-gate continue;
23187c478bd9Sstevel@tonic-gate }
23197c478bd9Sstevel@tonic-gate /*
23207c478bd9Sstevel@tonic-gate * If this isn't 'xxx=yyy', skip it. XXX
23217c478bd9Sstevel@tonic-gate */
23227c478bd9Sstevel@tonic-gate if ((endptr = strchr(*lenvp, '=')) == NULL) {
23237c478bd9Sstevel@tonic-gate continue;
23247c478bd9Sstevel@tonic-gate }
23257c478bd9Sstevel@tonic-gate length = endptr + 1 - *lenvp;
23267c478bd9Sstevel@tonic-gate for (j = 0; j < basicenv; j++) {
23277c478bd9Sstevel@tonic-gate if (strncmp(envinit[j], *lenvp, length) == 0) {
23287c478bd9Sstevel@tonic-gate /*
23297c478bd9Sstevel@tonic-gate * Replace previously established value
23307c478bd9Sstevel@tonic-gate */
23317c478bd9Sstevel@tonic-gate envinit[j] = *lenvp;
23327c478bd9Sstevel@tonic-gate break;
23337c478bd9Sstevel@tonic-gate }
23347c478bd9Sstevel@tonic-gate }
23357c478bd9Sstevel@tonic-gate if (j == basicenv) {
23367c478bd9Sstevel@tonic-gate /*
23377c478bd9Sstevel@tonic-gate * It's a new definition, so add it at the end.
23387c478bd9Sstevel@tonic-gate */
23397c478bd9Sstevel@tonic-gate envinit[basicenv++] = *lenvp;
23407c478bd9Sstevel@tonic-gate }
23417c478bd9Sstevel@tonic-gate }
23427c478bd9Sstevel@tonic-gate }
23437c478bd9Sstevel@tonic-gate
23447c478bd9Sstevel@tonic-gate /*
23457c478bd9Sstevel@tonic-gate * Add in all the environment variables picked up from the
23467c478bd9Sstevel@tonic-gate * argument list to "login" or from the user response to the
23477c478bd9Sstevel@tonic-gate * "login" request, if any.
23487c478bd9Sstevel@tonic-gate */
23497c478bd9Sstevel@tonic-gate
23507c478bd9Sstevel@tonic-gate if (envp == NULL)
23517c478bd9Sstevel@tonic-gate goto switch_env; /* done */
23527c478bd9Sstevel@tonic-gate
23537c478bd9Sstevel@tonic-gate for (j = 0, k = 0, l_index = 0;
23547c478bd9Sstevel@tonic-gate *envp != NULL && j < (MAXARGS-1);
23557c478bd9Sstevel@tonic-gate j++, envp++) {
23567c478bd9Sstevel@tonic-gate
23577c478bd9Sstevel@tonic-gate /*
23587c478bd9Sstevel@tonic-gate * Scan each string provided. If it doesn't have the
23597c478bd9Sstevel@tonic-gate * format xxx=yyy, then add the string "Ln=" to the beginning.
23607c478bd9Sstevel@tonic-gate */
23617c478bd9Sstevel@tonic-gate if ((endptr = strchr(*envp, '=')) == NULL) {
23627c478bd9Sstevel@tonic-gate /*
23637c478bd9Sstevel@tonic-gate * This much to be malloc'd:
23647c478bd9Sstevel@tonic-gate * strlen(*envp) + 1 char for 'L' +
23657c478bd9Sstevel@tonic-gate * MAXARGSWIDTH + 1 char for '=' + 1 for null char;
23667c478bd9Sstevel@tonic-gate *
23677c478bd9Sstevel@tonic-gate * total = strlen(*envp) + MAXARGSWIDTH + 3
23687c478bd9Sstevel@tonic-gate */
23697c478bd9Sstevel@tonic-gate int total = strlen(*envp) + MAXARGSWIDTH + 3;
23707c478bd9Sstevel@tonic-gate envinit[basicenv+k] = malloc(total);
23717c478bd9Sstevel@tonic-gate if (envinit[basicenv+k] == NULL) {
23727c478bd9Sstevel@tonic-gate (void) printf("%s: malloc failed\n", PROG_NAME);
23737c478bd9Sstevel@tonic-gate login_exit(1);
23747c478bd9Sstevel@tonic-gate }
23757c478bd9Sstevel@tonic-gate (void) snprintf(envinit[basicenv+k], total, "L%d=%s",
23767c478bd9Sstevel@tonic-gate l_index, *envp);
23777c478bd9Sstevel@tonic-gate
23787c478bd9Sstevel@tonic-gate k++;
23797c478bd9Sstevel@tonic-gate l_index++;
23807c478bd9Sstevel@tonic-gate } else {
23817c478bd9Sstevel@tonic-gate if (!legalenvvar(*envp)) { /* this env var permited? */
23827c478bd9Sstevel@tonic-gate continue;
23837c478bd9Sstevel@tonic-gate } else {
23847c478bd9Sstevel@tonic-gate
23857c478bd9Sstevel@tonic-gate /*
23867c478bd9Sstevel@tonic-gate * Check to see whether this string replaces
23877c478bd9Sstevel@tonic-gate * any previously defined string
23887c478bd9Sstevel@tonic-gate */
23897c478bd9Sstevel@tonic-gate for (i = 0, length = endptr + 1 - *envp;
23907c478bd9Sstevel@tonic-gate i < basicenv + k; i++) {
23917c478bd9Sstevel@tonic-gate if (strncmp(*envp, envinit[i], length)
23927c478bd9Sstevel@tonic-gate == 0) {
23937c478bd9Sstevel@tonic-gate envinit[i] = *envp;
23947c478bd9Sstevel@tonic-gate break;
23957c478bd9Sstevel@tonic-gate }
23967c478bd9Sstevel@tonic-gate }
23977c478bd9Sstevel@tonic-gate
23987c478bd9Sstevel@tonic-gate /*
23997c478bd9Sstevel@tonic-gate * If it doesn't, place it at the end of
24007c478bd9Sstevel@tonic-gate * environment array.
24017c478bd9Sstevel@tonic-gate */
24027c478bd9Sstevel@tonic-gate if (i == basicenv+k) {
24037c478bd9Sstevel@tonic-gate envinit[basicenv+k] = *envp;
24047c478bd9Sstevel@tonic-gate k++;
24057c478bd9Sstevel@tonic-gate }
24067c478bd9Sstevel@tonic-gate }
24077c478bd9Sstevel@tonic-gate }
24087c478bd9Sstevel@tonic-gate } /* for (j = 0 ... ) */
24097c478bd9Sstevel@tonic-gate
24107c478bd9Sstevel@tonic-gate switch_env:
24117c478bd9Sstevel@tonic-gate /*
24127c478bd9Sstevel@tonic-gate * Switch to the new environment.
24137c478bd9Sstevel@tonic-gate */
24147c478bd9Sstevel@tonic-gate environ = envinit;
24157c478bd9Sstevel@tonic-gate }
24167c478bd9Sstevel@tonic-gate
24177c478bd9Sstevel@tonic-gate /*
24187c478bd9Sstevel@tonic-gate * print_banner - Print the banner at start up
24197c478bd9Sstevel@tonic-gate * Do not turn on DOBANNER ifdef. This is not
24207c478bd9Sstevel@tonic-gate * relevant to SunOS.
24217c478bd9Sstevel@tonic-gate */
24227c478bd9Sstevel@tonic-gate
24237c478bd9Sstevel@tonic-gate static void
print_banner(void)24247c478bd9Sstevel@tonic-gate print_banner(void)
24257c478bd9Sstevel@tonic-gate {
24267c478bd9Sstevel@tonic-gate #ifdef DOBANNER
24277c478bd9Sstevel@tonic-gate uname(&un);
24287c478bd9Sstevel@tonic-gate #if i386
24297c478bd9Sstevel@tonic-gate (void) printf("UNIX System V/386 Release %s\n%s\n"
24307c478bd9Sstevel@tonic-gate "Copyright (C) 1984, 1986, 1987, 1988 AT&T\n"
24317c478bd9Sstevel@tonic-gate "Copyright (C) 1987, 1988 Microsoft Corp.\nAll Rights Reserved\n",
24327c478bd9Sstevel@tonic-gate un.release, un.nodename);
24337c478bd9Sstevel@tonic-gate #elif sun
24347c478bd9Sstevel@tonic-gate (void) printf("SunOS Release %s Sun Microsystems %s\n%s\n"
24357c478bd9Sstevel@tonic-gate "Copyright (c) 1984, 1986, 1987, 1988 AT&T\n"
24367c478bd9Sstevel@tonic-gate "Copyright (c) 1988, 1989, 1990, 1991 Sun Microsystems\n"
24377c478bd9Sstevel@tonic-gate "All Rights Reserved\n",
24387c478bd9Sstevel@tonic-gate un.release, un.machine, un.nodename);
24397c478bd9Sstevel@tonic-gate #else
24407c478bd9Sstevel@tonic-gate (void) printf("UNIX System V Release %s AT&T %s\n%s\n"
24417c478bd9Sstevel@tonic-gate "Copyright (c) 1984, 1986, 1987, 1988 AT&T\nAll Rights Reserved\n",
24427c478bd9Sstevel@tonic-gate un.release, un.machine, un.nodename);
24437c478bd9Sstevel@tonic-gate #endif /* i386 */
24447c478bd9Sstevel@tonic-gate #endif /* DOBANNER */
24457c478bd9Sstevel@tonic-gate }
24467c478bd9Sstevel@tonic-gate
24477c478bd9Sstevel@tonic-gate /*
24487c478bd9Sstevel@tonic-gate * display_last_login_time - Advise the user the time and date
24497c478bd9Sstevel@tonic-gate * that this login-id was last used.
24507c478bd9Sstevel@tonic-gate */
24517c478bd9Sstevel@tonic-gate
24527c478bd9Sstevel@tonic-gate static void
display_last_login_time(void)24537c478bd9Sstevel@tonic-gate display_last_login_time(void)
24547c478bd9Sstevel@tonic-gate {
24557c478bd9Sstevel@tonic-gate if (lastlogok) {
24567c478bd9Sstevel@tonic-gate (void) printf("Last login: %.*s ", 24-5, ctime(&ll.ll_time));
24577c478bd9Sstevel@tonic-gate
24587c478bd9Sstevel@tonic-gate if (*ll.ll_host != '\0')
24597c478bd9Sstevel@tonic-gate (void) printf("from %.*s\n", sizeof (ll.ll_host),
24607c478bd9Sstevel@tonic-gate ll.ll_host);
24617c478bd9Sstevel@tonic-gate else
24627c478bd9Sstevel@tonic-gate (void) printf("on %.*s\n", sizeof (ll.ll_line),
24637c478bd9Sstevel@tonic-gate ll.ll_line);
24647c478bd9Sstevel@tonic-gate }
24657c478bd9Sstevel@tonic-gate }
24667c478bd9Sstevel@tonic-gate
24677c478bd9Sstevel@tonic-gate /*
24687c478bd9Sstevel@tonic-gate * exec_the_shell - invoke the specified shell or start up program
24697c478bd9Sstevel@tonic-gate */
24707c478bd9Sstevel@tonic-gate
24717c478bd9Sstevel@tonic-gate static void
exec_the_shell(void)24727c478bd9Sstevel@tonic-gate exec_the_shell(void)
24737c478bd9Sstevel@tonic-gate {
24747c478bd9Sstevel@tonic-gate char *endptr;
24757c478bd9Sstevel@tonic-gate int i;
24767c478bd9Sstevel@tonic-gate
24777c478bd9Sstevel@tonic-gate (void) strlcat(minusnam, basename(pwd->pw_shell),
24787c478bd9Sstevel@tonic-gate sizeof (minusnam));
24797c478bd9Sstevel@tonic-gate
24807c478bd9Sstevel@tonic-gate /*
24817c478bd9Sstevel@tonic-gate * Exec the shell
24827c478bd9Sstevel@tonic-gate */
24837c478bd9Sstevel@tonic-gate (void) execl(pwd->pw_shell, minusnam, (char *)0);
24847c478bd9Sstevel@tonic-gate
24857c478bd9Sstevel@tonic-gate /*
24867c478bd9Sstevel@tonic-gate * pwd->pw_shell was not an executable object file, maybe it
24877c478bd9Sstevel@tonic-gate * is a shell proceedure or a command line with arguments.
24887c478bd9Sstevel@tonic-gate * If so, turn off the SHELL= environment variable.
24897c478bd9Sstevel@tonic-gate */
24907c478bd9Sstevel@tonic-gate for (i = 0; envinit[i] != NULL; ++i) {
24917c478bd9Sstevel@tonic-gate if ((envinit[i] == shell) &&
24927c478bd9Sstevel@tonic-gate ((endptr = strchr(shell, '=')) != NULL))
24937c478bd9Sstevel@tonic-gate (*++endptr) = '\0';
24947c478bd9Sstevel@tonic-gate }
24957c478bd9Sstevel@tonic-gate
24967c478bd9Sstevel@tonic-gate if (access(pwd->pw_shell, R_OK|X_OK) == 0) {
24977c478bd9Sstevel@tonic-gate (void) execl(SHELL, "sh", pwd->pw_shell, (char *)0);
24987c478bd9Sstevel@tonic-gate (void) execl(SHELL2, "sh", pwd->pw_shell, (char *)0);
24997c478bd9Sstevel@tonic-gate }
25007c478bd9Sstevel@tonic-gate
25017c478bd9Sstevel@tonic-gate (void) printf("No shell\n");
25027c478bd9Sstevel@tonic-gate }
25037c478bd9Sstevel@tonic-gate
25047c478bd9Sstevel@tonic-gate /*
25057c478bd9Sstevel@tonic-gate * login_exit - Call exit() and terminate.
25067c478bd9Sstevel@tonic-gate * This function is here for PAM so cleanup can
25077c478bd9Sstevel@tonic-gate * be done before the process exits.
25087c478bd9Sstevel@tonic-gate */
25097c478bd9Sstevel@tonic-gate static void
login_exit(int exit_code)25107c478bd9Sstevel@tonic-gate login_exit(int exit_code)
25117c478bd9Sstevel@tonic-gate {
25127c478bd9Sstevel@tonic-gate if (pamh)
25137c478bd9Sstevel@tonic-gate (void) pam_end(pamh, PAM_ABORT);
25147c478bd9Sstevel@tonic-gate
25157c478bd9Sstevel@tonic-gate if (audit_error)
25167c478bd9Sstevel@tonic-gate audit_failure(get_audit_id(), audit_error,
25177c478bd9Sstevel@tonic-gate pwd, remote_host, ttyn, zone_name);
25187c478bd9Sstevel@tonic-gate
25197c478bd9Sstevel@tonic-gate exit(exit_code);
25207c478bd9Sstevel@tonic-gate /*NOTREACHED*/
25217c478bd9Sstevel@tonic-gate }
25227c478bd9Sstevel@tonic-gate
25237c478bd9Sstevel@tonic-gate /*
25247c478bd9Sstevel@tonic-gate * Check if lenv and penv matches or not.
25257c478bd9Sstevel@tonic-gate */
25267c478bd9Sstevel@tonic-gate static int
locale_envmatch(char * lenv,char * penv)25277c478bd9Sstevel@tonic-gate locale_envmatch(char *lenv, char *penv)
25287c478bd9Sstevel@tonic-gate {
25297c478bd9Sstevel@tonic-gate while ((*lenv == *penv) && *lenv && *penv != '=') {
25307c478bd9Sstevel@tonic-gate lenv++;
25317c478bd9Sstevel@tonic-gate penv++;
25327c478bd9Sstevel@tonic-gate }
25337c478bd9Sstevel@tonic-gate
25347c478bd9Sstevel@tonic-gate /*
25357c478bd9Sstevel@tonic-gate * '/' is eliminated for security reason.
25367c478bd9Sstevel@tonic-gate */
25377c478bd9Sstevel@tonic-gate if (*lenv == '\0' && *penv == '=' && *(penv + 1) != '/')
25387c478bd9Sstevel@tonic-gate return (1);
25397c478bd9Sstevel@tonic-gate return (0);
25407c478bd9Sstevel@tonic-gate }
25417c478bd9Sstevel@tonic-gate
25427c478bd9Sstevel@tonic-gate static int
is_number(char * ptr)25437c478bd9Sstevel@tonic-gate is_number(char *ptr)
25447c478bd9Sstevel@tonic-gate {
25457c478bd9Sstevel@tonic-gate while (*ptr != '\0') {
25467c478bd9Sstevel@tonic-gate if (!isdigit(*ptr))
25477c478bd9Sstevel@tonic-gate return (0);
25487c478bd9Sstevel@tonic-gate ptr++;
25497c478bd9Sstevel@tonic-gate }
25507c478bd9Sstevel@tonic-gate return (1);
25517c478bd9Sstevel@tonic-gate }
2552