xref: /titanic_50/usr/src/cmd/ypcmd/yppasswd/yppasswdd.c (revision efd4c9b63ad77503c101fc6c2ed8ba96c9d52964)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #pragma ident	"%Z%%M%	%I%	%E% SMI"
28 
29 #include <stdio.h>
30 #include <stdlib.h>
31 #include <unistd.h>
32 #include <signal.h>
33 #include <fcntl.h>
34 #include <ctype.h>
35 #include <string.h>
36 #include <syslog.h>
37 #include <crypt.h>
38 #include <errno.h>
39 #include <tiuser.h>
40 #include <netdir.h>
41 #include <pwd.h>
42 #include <shadow.h>
43 #include <sys/types.h>
44 #include <sys/stat.h>
45 #include <sys/wait.h>
46 #include <sys/resource.h>
47 #include <rpc/rpc.h>
48 #include <rpc/pmap_clnt.h>
49 #include <rpcsvc/yppasswd.h>
50 #include <netconfig.h>
51 #include <deflt.h>
52 
53 /* N2L includes */
54 #include <ndbm.h>
55 #include "shim.h"
56 #include "yptol.h"
57 
58 /* must match sizes in passwd */
59 #define	STRSIZE 100
60 
61 #define	DEFDIR "/etc/"
62 #define	MYPASSWD "passwd"
63 #define	MYSHADOW "shadow"
64 #define	DEFAULT_YPPASSWDD "/etc/default/yppasswdd"
65 #define	YPPASSWDD_STR "check_restricted_shell_name=1"
66 
67 /* The guts are in there */
68 extern void changepasswd(SVCXPRT *);
69 
70 static void	boilerplate(struct svc_req *rqstp, SVCXPRT *transp);
71 static void	unlimit(int lim);
72 bool_t		validloginshell(char *sh, char *arg, int);
73 int		validstr(char *str, size_t size);
74 
75 extern char  *getusershell(void);
76 extern void   setusershell(void);
77 extern void   endusershell(void);
78 
79 int  Argc;
80 char **Argv;
81 int  mflag;			/* do a make */
82 int Mstart;
83 int single = 0;
84 int nogecos = 0;
85 int noshell = 0;
86 int nopw = 0;
87 int useadjunct = 0;
88 int useshadow = 0;
89 
90 static char *defshell = "/bin/sh";
91 
92 /* These are the various reasons we might exit. */
93 enum exitstat {
94     Esuccess,
95     EminusDandfiles,
96     Emissingdir,
97     Emissingadjunct,
98     Eaccesspasswd,
99     Eaccessshadow,
100     Echdir,
101     Egetnetconfigent,
102     Et_open,
103     Enetdir_rsvdport,
104     Et_sync,
105     Et_info,
106     Esvc_create,
107     Esvc_reg,
108     Esvcrun_ret,
109     ElockFail,
110     EparseFail
111 };
112 
113 static char err_usage[] =
114 "Usage:\n"
115 "        rpc.yppasswdd [-D directory | passwd [passwd.adjunct]]\n"
116 "                      [-nopw] [-nogecos]\n"
117 "                      [-noshell] [-m arg1 arg2 ...]\n"
118 "where\n"
119 "        directory is the directory where the passwd, shadow and/or\n"
120 "        passwd.adjunct files are found (/etc by default)\n"
121 "        It should match the setting of PWDIR in /var/yp/Makefile\n\n"
122 "        Alternatively, the old 4.1.x syntax is supported where\n"
123 "        passwd is the path to the passwd file\n"
124 "        passwd.adjunct is the patch to the passwd.adjunct file\n"
125 "        NOTES:\n"
126 "         1. The -D option and the passwd/passwd.adjunct arguments are\n"
127 "            mutually exclusive\n"
128 "         2. The old syntax deprecated and will be removed in a future\n"
129 "            release\n"
130 "         3. A shadow file found in the same directory as the passwd\n"
131 "            will be assumed to contain the password information\n\n"
132 "        arguments after -m are passed to make(1S) after password changes\n"
133 "        -nopw passwords may not be changed remotely using passwd\n"
134 "        -nogecos full name may not be changed remotely using passwd or chfn\n"
135 "        -noshell shell may not be changed remotely using passwd or chsh\n";
136 
137 char passwd_file[FILENAME_MAX], shadow_file[FILENAME_MAX];
138 char lockfile[FILENAME_MAX], adjunct_file[FILENAME_MAX];
139 
140 int
141 main(int argc, char **argv)
142 {
143 	SVCXPRT *transp4, *transp6, *transpl;
144 	struct netconfig *nconf4, *nconf6, *nconfl;
145 	int i, tli4, tli6, stat;
146 	int errorflag;
147 	int dfexcl; /* -D or files, not both flag */
148 	enum exitstat exitstatus = Esuccess;
149 	int connmaxrec = RPC_MAXDATASIZE;
150 
151 	strcpy(passwd_file, DEFDIR MYPASSWD);
152 	strcpy(shadow_file, DEFDIR MYSHADOW);
153 	strcpy(lockfile, DEFDIR ".pwd.lock");
154 	strcpy(adjunct_file, DEFDIR "security/passwd.adjunct");
155 
156 	Argc = argc;
157 	Argv = argv;
158 
159 	for (i = 1, errorflag = 0, dfexcl = 0; i < argc; i++) {
160 		if (argv[i][0] == '-' && argv[i][1] == 'm') {
161 		    if (access("/usr/ccs/bin/make", X_OK) < 0)
162 			fprintf(stderr,
163 				"%s: /usr/ccs/bin/make is not available, "
164 				"ignoring -m option",
165 				argv[0]);
166 		    else {
167 			mflag++;
168 			Mstart = i;
169 			break;
170 		    }
171 		} else if (argv[i][0] == '-' && argv[i][1] == 'D') {
172 		    switch (dfexcl) {
173 		    case 0:
174 			if (++i < argc) {
175 			    strcpy(passwd_file, argv[i]);
176 			    strcpy(shadow_file, argv[i]);
177 			    strcpy(adjunct_file, argv[i]);
178 			    strcpy(lockfile, argv[i]);
179 			    if (argv[i][strlen(argv[i]) - 1] == '/') {
180 				strcat(passwd_file, MYPASSWD);
181 				strcat(shadow_file, MYSHADOW);
182 				strcat(lockfile, ".pwd.lock");
183 				strcat(adjunct_file, "security/passwd.adjunct");
184 			    } else {
185 				strcat(passwd_file, "/" MYPASSWD);
186 				strcat(shadow_file, "/" MYSHADOW);
187 				strcat(lockfile, "/.pwd.lock");
188 				strcat(adjunct_file,
189 					"/security/passwd.adjunct");
190 			    }
191 			    dfexcl++;
192 			} else {
193 			    fprintf(stderr,
194 				"rpc.yppasswdd: -D option requires a "
195 				"directory argument\n");
196 			    errorflag++;
197 			    exitstatus = Emissingdir;
198 			}
199 			break;
200 		    case 1:
201 			fprintf(stderr,
202 				"rpc.yppasswdd: cannot specify passwd/"
203 				"passwd.adjunct pathnames AND use -D\n");
204 			errorflag++;
205 			dfexcl++;
206 			exitstatus = EminusDandfiles;
207 			break;
208 		    default:
209 			break;
210 		    }
211 	/* -single: Allow user to change only one of password,  */
212 	/*		shell, or full name at a time.  (WHY?)	*/
213 	/*	else if (strcmp(argv[i], "-single") == 0)	*/
214 	/*	    single = 1;					*/
215 	/*	else if (strcmp(argv[i], "-nosingle") == 0)	*/
216 	/*	    single = 0;					*/
217 		} else if (strcmp(argv[i], "-nogecos") == 0)
218 		    nogecos = 1;
219 		else if (strcmp(argv[i], "-nopw") == 0)
220 		    nopw = 1;
221 		else if (strcmp(argv[i], "-noshell") == 0)
222 		    noshell = 1;
223 		else if (argv[i][0] != '-') {
224 			/*
225 			 * If we find a shadow file, we warn that we're
226 			 * using it in addition to warning that the user
227 			 * it using a deprecated syntax.
228 			 */
229 		    errorflag++;
230 		    switch (dfexcl) {
231 		    case 0:
232 			strcpy(passwd_file, argv[i]);
233 			memset(shadow_file, 0, sizeof (shadow_file));
234 			strncpy(shadow_file, argv[i],
235 				strrchr(argv[i], '/') - argv[i] + 1);
236 			strcat(shadow_file, MYSHADOW);
237 			fprintf(stderr,
238 				"rpc.yppasswdd: specifying the password file"
239 				" on the command line is \n"
240 				"               obsolete, "
241 				"consider using the -D option instead.\n");
242 			if (access(shadow_file, F_OK) == 0) {
243 			    fprintf(stderr,
244 				    "rpc.yppasswdd: found a shadow file in "
245 				    "the same directory as %s\n"
246 				    "               It will be used.\n",
247 				    passwd_file);
248 			}
249 			if (i + 1 < argc && argv[i+1][0] != '-') {
250 			    strcpy(adjunct_file, argv[++i]);
251 			    if (access(adjunct_file, F_OK) != 0) {
252 				fprintf(stderr,
253 					"rpc.yppasswdd: adjunct file %s "
254 					"not found\n",
255 					adjunct_file);
256 				exitstatus = Emissingadjunct;
257 			    }
258 			}
259 			dfexcl++;
260 			break;
261 		    case 1:
262 			fprintf(stderr,
263 				"rpc.yppasswdd: cannot specify passwd/"
264 				"passwd.adjunct pathnames AND use -D\n");
265 			dfexcl++;
266 			exitstatus = EminusDandfiles;
267 			break;
268 		    default:
269 			break;
270 		    }
271 		} else {
272 		    errorflag++;
273 		    fprintf(stderr,
274 			    "rpc.yppasswdd: unrecognized option %s ignored\n",
275 			    argv[i]);
276 		}
277 	}
278 
279 	if (errorflag)
280 		fprintf(stderr, err_usage);
281 
282 	if (exitstatus)
283 		exit(exitstatus);
284 
285 	if (access(passwd_file, W_OK) < 0) {
286 		fprintf(stderr, "rpc.yppasswdd: can't access %s\n",
287 			passwd_file);
288 		exitstatus = Eaccesspasswd;
289 	}
290 	if (access(shadow_file, W_OK) == 0) {
291 		useshadow = 1;
292 	} else {
293 		/* We don't demand a shadow file unless we're looking at /etc */
294 		if (strcmp(DEFDIR MYSHADOW, shadow_file) == 0) {
295 		    fprintf(stderr, "rpc.yppasswdd: can't access %s\n",
296 				shadow_file);
297 		    exitstatus = Eaccessshadow;
298 		}
299 	}
300 	if (access(adjunct_file, W_OK) == 0) {
301 		/* using an adjunct file */
302 		useadjunct = 1;
303 	}
304 
305 	if (chdir("/var/yp") < 0) {
306 		fprintf(stderr, "rpc.yppasswdd: can't chdir to /var/yp\n");
307 		exitstatus = Echdir;
308 	}
309 
310 	if (exitstatus)
311 		exit(exitstatus);
312 
313 	if (errorflag)
314 		fprintf(stderr, "\nProceeding.\n");
315 
316 
317 	/*
318 	 * Initialize locking system.
319 	 * This is required for N2L version which accesses the DBM files.
320 	 * For the non N2L version this sets up some locking which, since non
321 	 * N2L mode does not access the DBM files, will be unused.
322 	 *
323 	 * This also sets up yptol_mode.
324 	 */
325 	if (!init_lock_system(TRUE)) {
326 		fprintf(stderr,
327 			"rpc.yppasswdd: Cant initialize locking system\n");
328 		exit(ElockFail);
329 	}
330 
331 #ifndef	DEBUG
332 	/* Close everything, but stdin/stdout/stderr */
333 	closefrom(3);
334 #endif
335 
336 	if (yptol_mode) {
337 		stat = parseConfig(NULL, NTOL_MAP_FILE);
338 		if (stat == 1) {
339 			fprintf(stderr, "yppasswdd : NIS to LDAP mapping"
340 							" inactive.\n");
341 		} else if (stat != 0) {
342 			fprintf(stderr, "yppasswdd : Aborting after NIS to LDAP"
343 							" mapping error.\n");
344 			exit(EparseFail);
345 		}
346 	}
347 
348 #ifndef	DEBUG
349 	/* Wack umask that we inherited from parent */
350 	umask(0);
351 
352 	/* Be a midwife to ourselves */
353 	if (fork())
354 		exit(Esuccess);
355 
356 	/* Disassociation is hard to do, la la la */
357 	setpgrp();
358 	setsid();
359 
360 	/* Ignore stuff */
361 	signal(SIGHUP, SIG_IGN);
362 	signal(SIGINT, SIG_IGN);
363 	signal(SIGWINCH, SIG_IGN);
364 	signal(SIGTSTP, SIG_IGN);
365 	signal(SIGTTIN, SIG_IGN);
366 	signal(SIGTTOU, SIG_IGN);
367 	signal(SIGCHLD, SIG_IGN);
368 
369 	/*
370 	 * Just in case that wasn't enough, let's fork
371 	 * again.  (per Stevens).
372 	 */
373 	if (fork())
374 		exit(Esuccess);
375 
376 	/*
377 	 * We need stdin, stdout, and stderr later when we
378 	 * fork a make(1).
379 	 */
380 	freopen("/dev/null", "r+", stdin);
381 	freopen("/dev/null", "r+", stdout);
382 	freopen("/dev/null", "r+", stderr);
383 #endif
384 
385 	openlog("yppasswdd", LOG_CONS | LOG_PID, LOG_AUTH);
386 	unlimit(RLIMIT_CPU);
387 	unlimit(RLIMIT_FSIZE);
388 
389 	/*
390 	 * Set non-blocking mode and maximum record size for
391 	 * connection oriented RPC transports.
392 	 */
393 	if (!rpc_control(RPC_SVC_CONNMAXREC_SET, &connmaxrec)) {
394 		syslog(LOG_INFO, "unable to set maximum RPC record size");
395 	}
396 
397 	nconf4 = getnetconfigent("udp");
398 	nconf6 = getnetconfigent("udp6");
399 	if (nconf4 == 0 && nconf6 == 0) {
400 		syslog(LOG_ERR, "udp/udp6 transport not supported\n");
401 		exit(Egetnetconfigent);
402 	}
403 
404 	tli4 = (nconf4 != 0) ? t_open(nconf4->nc_device, O_RDWR, NULL) : -1;
405 	tli6 = (nconf6 != 0) ? t_open(nconf6->nc_device, O_RDWR, NULL) : -1;
406 
407 	if (tli4 == -1 && tli6 == -1) {
408 		syslog(LOG_ERR, "can\'t open TLI endpoint(s)\n");
409 		exit(Et_open);
410 	}
411 
412 	if (tli4 != -1) {
413 		if (netdir_options(nconf4, ND_SET_RESERVEDPORT, tli4, NULL)) {
414 			syslog(LOG_ERR, "could not set reserved port: %s\n",
415 				netdir_sperror());
416 			exit(Enetdir_rsvdport);
417 		}
418 	}
419 	if (tli6 != -1) {
420 		if (netdir_options(nconf6, ND_SET_RESERVEDPORT, tli6, NULL)) {
421 			syslog(LOG_ERR, "could not set reserved port: %s\n",
422 				netdir_sperror());
423 			exit(Enetdir_rsvdport);
424 		}
425 	}
426 #ifdef	DEBUG
427 	{
428 		int i, tli[2];
429 		char *label[2] = {"udp", "udp6"};
430 		int state;
431 		struct t_info tinfo;
432 
433 		tli[0] = tli4;
434 		tli[1] = tli6;
435 
436 		for (i = 0; i < sizeof (tli)/sizeof (tli[0]); i++) {
437 			fprintf(stderr, "transport %s, fd = %d\n",
438 				tli[i], label[i]);
439 			if ((state = t_sync(tli[i])) < 0) {
440 				fprintf(stderr, "t_sync failed: %s\n",
441 					t_errlist[t_errno]);
442 				exit(Et_sync);
443 			}
444 			if (t_getinfo(tli[i], &tinfo) < 0) {
445 				fprintf(stderr, "t_getinfo failed: %s\n",
446 					t_errlist[t_errno]);
447 				exit(Et_info);
448 			}
449 
450 			switch (state) {
451 			case T_UNBND:
452 				fprintf(stderr, "TLI is unbound\n");
453 				break;
454 			case T_IDLE:
455 				fprintf(stderr, "TLI is idle\n");
456 				break;
457 			case T_INREL:
458 				fprintf(stderr,
459 					"other side wants to release\n");
460 				break;
461 			case T_INCON:
462 				fprintf(stderr, "T_INCON\n");
463 				break;
464 			case T_DATAXFER:
465 				fprintf(stderr, "T_DATAXFER\n");
466 				break;
467 			default:
468 				fprintf(stderr, "no state info, state = %d\n",
469 					state);
470 			}
471 		}
472 	}
473 #endif
474 	if (tli4 != -1) {
475 		rpcb_unset((ulong_t)YPPASSWDPROG, (ulong_t)YPPASSWDVERS,
476 			nconf4);
477 		transp4 = svc_tli_create(tli4, nconf4, NULL, 0, 0);
478 	} else {
479 		transp4 = 0;
480 	}
481 	if (tli6 != -1) {
482 		rpcb_unset((ulong_t)YPPASSWDPROG, (ulong_t)YPPASSWDVERS,
483 			nconf6);
484 		transp6 = svc_tli_create(tli6, nconf6, NULL, 0, 0);
485 	} else {
486 		transp6 = 0;
487 	}
488 	if (transp4 == 0 && transp6 == 0) {
489 		syslog(LOG_ERR, "yppasswdd: couldn't create an RPC server\n");
490 		exit(Esvc_create);
491 	}
492 	if (transp4 && !svc_reg(transp4, (ulong_t)YPPASSWDPROG,
493 			(ulong_t)YPPASSWDVERS, boilerplate, nconf4)) {
494 		syslog(LOG_ERR, "yppasswdd: couldn't register yppasswdd\n");
495 		exit(Esvc_reg);
496 	}
497 	if (transp6 && !svc_reg(transp6, (ulong_t)YPPASSWDPROG,
498 			(ulong_t)YPPASSWDVERS, boilerplate, nconf6)) {
499 		syslog(LOG_ERR, "yppasswdd: couldn't register yppasswdd\n");
500 		exit(Esvc_reg);
501 	}
502 
503 	/*
504 	 * Create a loopback RPC service for secure authentication of local
505 	 * principals -- we need this for accepting passwd updates from
506 	 * root on the master server.
507 	 */
508 	if ((nconfl = getnetconfigent("ticlts")) == NULL) {
509 	    syslog(LOG_ERR, "transport ticlts not supported\n");
510 	    exit(Egetnetconfigent);
511 	}
512 	rpcb_unset((ulong_t)YPPASSWDPROG, (ulong_t)YPPASSWDVERS, nconfl);
513 	transpl = svc_tli_create(RPC_ANYFD, nconfl, NULL, 0, 0);
514 	if (transpl == NULL) {
515 	    syslog(LOG_ERR,
516 		"yppasswdd: couldn't create an loopback RPC server\n");
517 	    exit(Esvc_create);
518 	}
519 	if (!svc_reg(transpl, (ulong_t)YPPASSWDPROG, (ulong_t)YPPASSWDVERS,
520 			boilerplate, nconfl)) {
521 	    syslog(LOG_ERR, "yppasswdd: couldn't register yppasswdd\n");
522 	    exit(Esvc_reg);
523 	}
524 	__rpc_negotiate_uid(transpl->xp_fd);
525 	freenetconfigent(nconf4);
526 	freenetconfigent(nconf6);
527 	freenetconfigent(nconfl);
528 	svc_run();
529 	syslog(LOG_ERR, "yppasswdd: svc_run shouldn't have returned\n");
530 
531 	return (Esvcrun_ret);
532 	/* NOTREACHED */
533 }
534 
535 static void
536 boilerplate(struct svc_req *rqstp, SVCXPRT *transp)
537 {
538 	switch (rqstp->rq_proc) {
539 	case NULLPROC:
540 		if (!svc_sendreply(transp, xdr_void, (char *)0))
541 		    syslog(LOG_WARNING,
542 			"yppasswdd: couldn't reply to RPC call\n");
543 		break;
544 	case YPPASSWDPROC_UPDATE:
545 		if (yptol_mode)
546 			shim_changepasswd(transp);
547 		else
548 			changepasswd(transp);
549 		break;
550 	}
551 }
552 
553 int
554 validstr(char *str, size_t size)
555 {
556 	char c;
557 
558 	if (str == NULL || strlen(str) > size || strchr(str, ':'))
559 		return (0);
560 	while (c = *str++) {
561 		if (iscntrl(c))
562 		    return (0);
563 	}
564 	return (1);
565 }
566 
567 bool_t
568 validloginshell(char *pw_shell, char *arg, int privileged)
569 {
570 	static char newshell[STRSIZE];
571 	char *cp, *valid;
572 
573 	if (pw_shell == 0 || *pw_shell == '\0')
574 		pw_shell = defshell;
575 
576 	if ((defopen(DEFAULT_YPPASSWDD)) == 0) {
577 		if ((defread(YPPASSWDD_STR)) != NULL) {
578 			cp = strrchr(pw_shell, '/');
579 			if (cp)
580 				cp++;
581 			else
582 				cp = pw_shell;
583 
584 			if (*cp == 'r') {
585 				syslog(LOG_ERR,
586 					"yppasswdd: cannot change "
587 					"from restricted shell %s\n",
588 					pw_shell);
589 				return (0);
590 			}
591 		}
592 		(void) defopen((char *)NULL);
593 	}
594 
595 	for (valid = getusershell(); valid; valid = getusershell())
596 		if (strcmp(pw_shell, valid) == 0)
597 		    break;
598 
599 	if (valid == NULL && !privileged) {
600 		syslog(LOG_ERR, "yppasswdd: Current shell is not valid: %s\n",
601 			pw_shell);
602 		endusershell();
603 		return (0);
604 	}
605 
606 	if (arg != 0) {
607 		strncpy(newshell, arg, sizeof (newshell) - 1);
608 		newshell[sizeof (newshell) - 1] = 0;
609 	} else {
610 		endusershell();
611 		return (0);
612 	}
613 
614 	/*
615 	 * Allow user to give shell name w/o preceding pathname.
616 	 */
617 	setusershell();
618 	for (valid = getusershell(); valid; valid = getusershell()) {
619 		if (newshell[0] == '/') {
620 		    cp = valid;
621 		} else {
622 		    cp = strrchr(valid, '/');
623 		    if (cp == 0)
624 			cp = valid;
625 		    else
626 			cp++;
627 		}
628 		if (strcmp(newshell, cp) == 0)
629 		    break;
630 	}
631 
632 	if (valid == 0) {
633 		if (!privileged || newshell[0] != '/') {
634 			syslog(LOG_WARNING,
635 				"%s is unacceptable as a new shell.\n",
636 				newshell);
637 			endusershell();
638 			return (0);
639 		}
640 		valid = newshell;
641 	}
642 
643 	if (access(valid, X_OK) < 0) {
644 		syslog(LOG_WARNING, "%s is unavailable.\n", valid);
645 		endusershell();
646 		return (0);
647 	}
648 
649 	strncpy(newshell, valid, sizeof (newshell));
650 	pw_shell =  newshell;
651 	endusershell();
652 	return (1);
653 }
654 
655 static void
656 unlimit(int lim)
657 {
658 	struct rlimit rlim;
659 	rlim.rlim_cur = rlim.rlim_max = RLIM_INFINITY;
660 	setrlimit(lim, &rlim);
661 }
662