Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 1 | /* vi: set sw=4 ts=4: */ |
Bernhard Reutner-Fischer | 5a620ea | 2006-01-19 18:04:15 +0000 | [diff] [blame] | 2 | /* |
Rob Landley | 3bfcf3c | 2006-07-10 03:05:46 +0000 | [diff] [blame] | 3 | * Mini su implementation for busybox |
| 4 | * |
Bernhard Reutner-Fischer | 7fee0c4 | 2006-09-13 16:39:19 +0000 | [diff] [blame] | 5 | * Licensed under the GPL v2 or later, see the file LICENSE in this tarball. |
Rob Landley | 3bfcf3c | 2006-07-10 03:05:46 +0000 | [diff] [blame] | 6 | */ |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 7 | |
Denis Vlasenko | b6adbf1 | 2007-05-26 19:00:18 +0000 | [diff] [blame] | 8 | #include "libbb.h" |
Rob Landley | 3bfcf3c | 2006-07-10 03:05:46 +0000 | [diff] [blame] | 9 | #include <syslog.h> |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 10 | |
Denys Vlasenko | 26ffe81 | 2010-02-26 10:01:18 +0100 | [diff] [blame] | 11 | #if ENABLE_FEATURE_SU_CHECKS_SHELLS |
| 12 | /* Return 1 if SHELL is a restricted shell (one not returned by |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 13 | * getusershell), else 0, meaning it is a standard shell. */ |
Denys Vlasenko | 26ffe81 | 2010-02-26 10:01:18 +0100 | [diff] [blame] | 14 | static int restricted_shell(const char *shell) |
| 15 | { |
| 16 | char *line; |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 17 | int result = 1; |
Denys Vlasenko | 26ffe81 | 2010-02-26 10:01:18 +0100 | [diff] [blame] | 18 | |
| 19 | /*setusershell(); - getusershell does it itself*/ |
| 20 | while ((line = getusershell()) != NULL) { |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 21 | if (/* *line != '#' && */ strcmp(line, shell) == 0) { |
| 22 | result = 0; |
| 23 | break; |
| 24 | } |
Denys Vlasenko | 26ffe81 | 2010-02-26 10:01:18 +0100 | [diff] [blame] | 25 | } |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 26 | if (ENABLE_FEATURE_CLEAN_UP) |
| 27 | endusershell(); |
| 28 | return result; |
Denys Vlasenko | 26ffe81 | 2010-02-26 10:01:18 +0100 | [diff] [blame] | 29 | } |
| 30 | #endif |
| 31 | |
Bernhard Reutner-Fischer | 359d7ca | 2006-12-19 08:55:38 +0000 | [diff] [blame] | 32 | #define SU_OPT_mp (3) |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 33 | #define SU_OPT_l (4) |
Bernhard Reutner-Fischer | 359d7ca | 2006-12-19 08:55:38 +0000 | [diff] [blame] | 34 | |
Denis Vlasenko | 9b49a5e | 2007-10-11 10:05:36 +0000 | [diff] [blame] | 35 | int su_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; |
Denis Vlasenko | a60f84e | 2008-07-05 09:18:54 +0000 | [diff] [blame] | 36 | int su_main(int argc UNUSED_PARAM, char **argv) |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 37 | { |
Denis Vlasenko | 15b213e | 2006-12-19 00:20:20 +0000 | [diff] [blame] | 38 | unsigned flags; |
Denis Vlasenko | 06c0a71 | 2007-01-29 22:51:44 +0000 | [diff] [blame] | 39 | char *opt_shell = NULL; |
| 40 | char *opt_command = NULL; |
| 41 | const char *opt_username = "root"; |
Glenn L McGrath | a6b7bdc | 2003-08-29 07:38:56 +0000 | [diff] [blame] | 42 | struct passwd *pw; |
| 43 | uid_t cur_uid = getuid(); |
Glenn L McGrath | a6b7bdc | 2003-08-29 07:38:56 +0000 | [diff] [blame] | 44 | const char *tty; |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 45 | char user_buf[64]; |
| 46 | const char *old_user; |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 47 | |
Denis Vlasenko | fe7cd64 | 2007-08-18 15:32:12 +0000 | [diff] [blame] | 48 | flags = getopt32(argv, "mplc:s:", &opt_command, &opt_shell); |
Denis Vlasenko | 62a90cd | 2008-03-17 09:07:36 +0000 | [diff] [blame] | 49 | //argc -= optind; |
Denis Vlasenko | e13a537 | 2006-12-23 02:59:06 +0000 | [diff] [blame] | 50 | argv += optind; |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 51 | |
Denis Vlasenko | 62a90cd | 2008-03-17 09:07:36 +0000 | [diff] [blame] | 52 | if (argv[0] && LONE_DASH(argv[0])) { |
Bernhard Reutner-Fischer | df798b7 | 2006-06-14 16:36:45 +0000 | [diff] [blame] | 53 | flags |= SU_OPT_l; |
Denis Vlasenko | 9f73944 | 2006-12-16 23:49:13 +0000 | [diff] [blame] | 54 | argv++; |
Denis Vlasenko | a980165 | 2006-09-07 16:20:03 +0000 | [diff] [blame] | 55 | } |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 56 | |
| 57 | /* get user if specified */ |
Denis Vlasenko | 62a90cd | 2008-03-17 09:07:36 +0000 | [diff] [blame] | 58 | if (argv[0]) { |
Denis Vlasenko | 9f73944 | 2006-12-16 23:49:13 +0000 | [diff] [blame] | 59 | opt_username = argv[0]; |
Denis Vlasenko | 9f73944 | 2006-12-16 23:49:13 +0000 | [diff] [blame] | 60 | argv++; |
| 61 | } |
Eric Andersen | c7bda1c | 2004-03-15 08:29:22 +0000 | [diff] [blame] | 62 | |
Bernhard Reutner-Fischer | 359d7ca | 2006-12-19 08:55:38 +0000 | [diff] [blame] | 63 | if (ENABLE_FEATURE_SU_SYSLOG) { |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 64 | /* The utmp entry (via getlogin) is probably the best way to |
| 65 | * identify the user, especially if someone su's from a su-shell. |
Denys Vlasenko | d069e53 | 2009-09-09 23:12:10 +0200 | [diff] [blame] | 66 | * But getlogin can fail -- usually due to lack of utmp entry. |
| 67 | * in this case resort to getpwuid. */ |
Denys Vlasenko | d069e53 | 2009-09-09 23:12:10 +0200 | [diff] [blame] | 68 | #if ENABLE_FEATURE_UTMP |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 69 | old_user = user_buf; |
Denys Vlasenko | d069e53 | 2009-09-09 23:12:10 +0200 | [diff] [blame] | 70 | if (getlogin_r(user_buf, sizeof(user_buf)) != 0) |
| 71 | #endif |
| 72 | { |
| 73 | pw = getpwuid(cur_uid); |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 74 | old_user = pw ? xstrdup(pw->pw_name) : ""; |
Denys Vlasenko | d069e53 | 2009-09-09 23:12:10 +0200 | [diff] [blame] | 75 | } |
Denys Vlasenko | d069e53 | 2009-09-09 23:12:10 +0200 | [diff] [blame] | 76 | tty = xmalloc_ttyname(2); |
| 77 | if (!tty) { |
| 78 | tty = "none"; |
| 79 | } |
Denis Vlasenko | 8f8f268 | 2006-10-03 21:00:43 +0000 | [diff] [blame] | 80 | openlog(applet_name, 0, LOG_AUTH); |
Glenn L McGrath | a6b7bdc | 2003-08-29 07:38:56 +0000 | [diff] [blame] | 81 | } |
Glenn L McGrath | a6b7bdc | 2003-08-29 07:38:56 +0000 | [diff] [blame] | 82 | |
Denis Vlasenko | d7a805e | 2008-12-03 19:05:55 +0000 | [diff] [blame] | 83 | pw = xgetpwnam(opt_username); |
Eric Andersen | c7bda1c | 2004-03-15 08:29:22 +0000 | [diff] [blame] | 84 | |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 85 | if (cur_uid == 0 || correct_password(pw)) { |
Bernhard Reutner-Fischer | 359d7ca | 2006-12-19 08:55:38 +0000 | [diff] [blame] | 86 | if (ENABLE_FEATURE_SU_SYSLOG) |
Denis Vlasenko | 15b213e | 2006-12-19 00:20:20 +0000 | [diff] [blame] | 87 | syslog(LOG_NOTICE, "%c %s %s:%s", |
| 88 | '+', tty, old_user, opt_username); |
Glenn L McGrath | a6b7bdc | 2003-08-29 07:38:56 +0000 | [diff] [blame] | 89 | } else { |
Bernhard Reutner-Fischer | 359d7ca | 2006-12-19 08:55:38 +0000 | [diff] [blame] | 90 | if (ENABLE_FEATURE_SU_SYSLOG) |
Denis Vlasenko | 15b213e | 2006-12-19 00:20:20 +0000 | [diff] [blame] | 91 | syslog(LOG_NOTICE, "%c %s %s:%s", |
| 92 | '-', tty, old_user, opt_username); |
Rob Landley | 3bfcf3c | 2006-07-10 03:05:46 +0000 | [diff] [blame] | 93 | bb_error_msg_and_die("incorrect password"); |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 94 | } |
| 95 | |
Bernhard Reutner-Fischer | 359d7ca | 2006-12-19 08:55:38 +0000 | [diff] [blame] | 96 | if (ENABLE_FEATURE_CLEAN_UP && ENABLE_FEATURE_SU_SYSLOG) { |
Rob Landley | 3bfcf3c | 2006-07-10 03:05:46 +0000 | [diff] [blame] | 97 | closelog(); |
Rob Landley | 3bfcf3c | 2006-07-10 03:05:46 +0000 | [diff] [blame] | 98 | } |
Glenn L McGrath | a6b7bdc | 2003-08-29 07:38:56 +0000 | [diff] [blame] | 99 | |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 100 | if (!opt_shell && (flags & SU_OPT_mp)) { |
| 101 | /* -s SHELL is not given, but "preserve env" opt is */ |
Denis Vlasenko | 15b213e | 2006-12-19 00:20:20 +0000 | [diff] [blame] | 102 | opt_shell = getenv("SHELL"); |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 103 | } |
| 104 | |
| 105 | /* Make sure pw->pw_shell is non-NULL. It may be NULL when NEW_USER |
| 106 | * is a username that is retrieved via NIS (YP), that doesn't have |
| 107 | * a default shell listed. */ |
| 108 | if (!pw->pw_shell || !pw->pw_shell[0]) |
| 109 | pw->pw_shell = (char *)DEFAULT_SHELL; |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 110 | |
Denis Vlasenko | 15b213e | 2006-12-19 00:20:20 +0000 | [diff] [blame] | 111 | #if ENABLE_FEATURE_SU_CHECKS_SHELLS |
Denys Vlasenko | 26ffe81 | 2010-02-26 10:01:18 +0100 | [diff] [blame] | 112 | if (opt_shell && cur_uid != 0 && restricted_shell(pw->pw_shell)) { |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 113 | /* The user being su'd to has a nonstandard shell, and so is |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 114 | * probably a uucp account or has restricted access. Don't |
| 115 | * compromise the account by allowing access with a standard |
| 116 | * shell. */ |
Rob Landley | 3bfcf3c | 2006-07-10 03:05:46 +0000 | [diff] [blame] | 117 | bb_error_msg("using restricted shell"); |
Denis Vlasenko | a2f6101 | 2007-09-10 13:15:28 +0000 | [diff] [blame] | 118 | opt_shell = NULL; |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 119 | } |
Ladislav Michl | a73b87e | 2010-06-27 03:23:31 +0200 | [diff] [blame^] | 120 | /* else: user can run whatever he wants via "su -s PROG USER". |
| 121 | * This is safe since PROG is run under user's uid/gid. */ |
Denis Vlasenko | 15b213e | 2006-12-19 00:20:20 +0000 | [diff] [blame] | 122 | #endif |
| 123 | if (!opt_shell) |
| 124 | opt_shell = pw->pw_shell; |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 125 | |
Rob Landley | 3bfcf3c | 2006-07-10 03:05:46 +0000 | [diff] [blame] | 126 | change_identity(pw); |
Denys Vlasenko | fd686a2 | 2010-02-26 09:52:45 +0100 | [diff] [blame] | 127 | setup_environment(opt_shell, |
| 128 | ((flags & SU_OPT_l) / SU_OPT_l * SETUP_ENV_CLEARENV) |
| 129 | + (!(flags & SU_OPT_mp) * SETUP_ENV_CHANGEENV), |
| 130 | pw); |
Denis Vlasenko | 5e34ff2 | 2009-04-21 11:09:40 +0000 | [diff] [blame] | 131 | IF_SELINUX(set_current_security_context(NULL);) |
Rob Landley | 3bfcf3c | 2006-07-10 03:05:46 +0000 | [diff] [blame] | 132 | |
Rob Landley | 1870737 | 2006-07-15 19:46:46 +0000 | [diff] [blame] | 133 | /* Never returns */ |
Denis Vlasenko | 9f73944 | 2006-12-16 23:49:13 +0000 | [diff] [blame] | 134 | run_shell(opt_shell, flags & SU_OPT_l, opt_command, (const char**)argv); |
Eric Andersen | c7bda1c | 2004-03-15 08:29:22 +0000 | [diff] [blame] | 135 | |
Denis Vlasenko | a2f6101 | 2007-09-10 13:15:28 +0000 | [diff] [blame] | 136 | /* return EXIT_FAILURE; - not reached */ |
Robert Griebl | 1fca558 | 2002-06-04 20:45:46 +0000 | [diff] [blame] | 137 | } |