| djm@openbsd.org | 26f96ca | 2018-06-15 07:01:11 +0000 | [diff] [blame] | 1 | /* $OpenBSD: uidswap.c,v 1.40 2018/06/15 07:01:11 djm Exp $ */ | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 2 | /* | 
| Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 3 |  * Author: Tatu Ylonen <ylo@cs.hut.fi> | 
 | 4 |  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 
 | 5 |  *                    All rights reserved | 
| Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 6 |  * Code for uid-swapping. | 
| Damien Miller | e4340be | 2000-09-16 13:29:08 +1100 | [diff] [blame] | 7 |  * | 
 | 8 |  * As far as I am concerned, the code I have written for this software | 
 | 9 |  * can be used freely for any purpose.  Any derived versions of this | 
 | 10 |  * software must be clearly marked as such, and if the derived work is | 
 | 11 |  * incompatible with the protocol description in the RFC file, it must be | 
 | 12 |  * called by a name other than "ssh" or "Secure Shell". | 
| Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 13 |  */ | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 14 |  | 
 | 15 | #include "includes.h" | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 16 |  | 
| Darren Tucker | 3997249 | 2006-07-12 22:22:46 +1000 | [diff] [blame] | 17 | #include <errno.h> | 
| Damien Miller | 9f2abc4 | 2006-07-10 20:53:08 +1000 | [diff] [blame] | 18 | #include <pwd.h> | 
| Damien Miller | e3476ed | 2006-07-24 14:13:33 +1000 | [diff] [blame] | 19 | #include <string.h> | 
| Damien Miller | e6b3b61 | 2006-07-24 14:01:23 +1000 | [diff] [blame] | 20 | #include <unistd.h> | 
| deraadt@openbsd.org | 2ae4f33 | 2015-01-16 06:40:12 +0000 | [diff] [blame] | 21 | #include <limits.h> | 
| Damien Miller | d783435 | 2006-08-05 12:39:39 +1000 | [diff] [blame] | 22 | #include <stdarg.h> | 
| Damien Miller | 0600c70 | 2013-11-21 13:55:43 +1100 | [diff] [blame] | 23 | #include <stdlib.h> | 
| Damien Miller | 9f2abc4 | 2006-07-10 20:53:08 +1000 | [diff] [blame] | 24 |  | 
| Damien Miller | 427a1d5 | 2006-07-10 20:20:33 +1000 | [diff] [blame] | 25 | #include <grp.h> | 
 | 26 |  | 
| Ben Lindstrom | 226cfa0 | 2001-01-22 05:34:40 +0000 | [diff] [blame] | 27 | #include "log.h" | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 28 | #include "uidswap.h" | 
| Damien Miller | a811d9a | 2004-02-24 13:05:11 +1100 | [diff] [blame] | 29 | #include "xmalloc.h" | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 30 |  | 
| Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 31 | /* | 
 | 32 |  * Note: all these functions must work in all of the following cases: | 
 | 33 |  *    1. euid=0, ruid=0 | 
 | 34 |  *    2. euid=0, ruid!=0 | 
 | 35 |  *    3. euid!=0, ruid!=0 | 
 | 36 |  * Additionally, they must work regardless of whether the system has | 
 | 37 |  * POSIX saved uids or not. | 
 | 38 |  */ | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 39 |  | 
| Ben Lindstrom | 4468b26 | 2001-04-26 23:03:37 +0000 | [diff] [blame] | 40 | #if defined(_POSIX_SAVED_IDS) && !defined(BROKEN_SAVED_UIDS) | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 41 | /* Lets assume that posix saved ids also work with seteuid, even though that | 
 | 42 |    is not part of the posix specification. */ | 
| Ben Lindstrom | 4468b26 | 2001-04-26 23:03:37 +0000 | [diff] [blame] | 43 | #define SAVED_IDS_WORK_WITH_SETEUID | 
 | 44 | /* Saved effective uid. */ | 
 | 45 | static uid_t 	saved_euid = 0; | 
 | 46 | static gid_t	saved_egid = 0; | 
 | 47 | #endif | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 48 |  | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 49 | /* Saved effective uid. */ | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 50 | static int	privileged = 0; | 
 | 51 | static int	temporarily_use_uid_effective = 0; | 
| djm@openbsd.org | 26f96ca | 2018-06-15 07:01:11 +0000 | [diff] [blame] | 52 | static uid_t	user_groups_uid; | 
| Damien Miller | a811d9a | 2004-02-24 13:05:11 +1100 | [diff] [blame] | 53 | static gid_t	*saved_egroups = NULL, *user_groups = NULL; | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 54 | static int	saved_egroupslen = -1, user_groupslen = -1; | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 55 |  | 
| Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 56 | /* | 
 | 57 |  * Temporarily changes to the given uid.  If the effective user | 
 | 58 |  * id is not root, this does nothing.  This call cannot be nested. | 
 | 59 |  */ | 
| Damien Miller | 4af5130 | 2000-04-16 11:18:38 +1000 | [diff] [blame] | 60 | void | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 61 | temporarily_use_uid(struct passwd *pw) | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 62 | { | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 63 | 	/* Save the current euid, and egroups. */ | 
| Ben Lindstrom | 4468b26 | 2001-04-26 23:03:37 +0000 | [diff] [blame] | 64 | #ifdef SAVED_IDS_WORK_WITH_SETEUID | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 65 | 	saved_euid = geteuid(); | 
| Ben Lindstrom | 4468b26 | 2001-04-26 23:03:37 +0000 | [diff] [blame] | 66 | 	saved_egid = getegid(); | 
| Ben Lindstrom | 1fa330c | 2002-07-23 21:29:49 +0000 | [diff] [blame] | 67 | 	debug("temporarily_use_uid: %u/%u (e=%u/%u)", | 
 | 68 | 	    (u_int)pw->pw_uid, (u_int)pw->pw_gid, | 
 | 69 | 	    (u_int)saved_euid, (u_int)saved_egid); | 
| Darren Tucker | 2ea9b18 | 2005-02-22 17:57:13 +1100 | [diff] [blame] | 70 | #ifndef HAVE_CYGWIN | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 71 | 	if (saved_euid != 0) { | 
 | 72 | 		privileged = 0; | 
 | 73 | 		return; | 
 | 74 | 	} | 
| Darren Tucker | 2ea9b18 | 2005-02-22 17:57:13 +1100 | [diff] [blame] | 75 | #endif | 
| Ben Lindstrom | 4468b26 | 2001-04-26 23:03:37 +0000 | [diff] [blame] | 76 | #else | 
 | 77 | 	if (geteuid() != 0) { | 
 | 78 | 		privileged = 0; | 
 | 79 | 		return; | 
 | 80 | 	} | 
 | 81 | #endif /* SAVED_IDS_WORK_WITH_SETEUID */ | 
 | 82 |  | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 83 | 	privileged = 1; | 
 | 84 | 	temporarily_use_uid_effective = 1; | 
| Damien Miller | a811d9a | 2004-02-24 13:05:11 +1100 | [diff] [blame] | 85 |  | 
 | 86 | 	saved_egroupslen = getgroups(0, NULL); | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 87 | 	if (saved_egroupslen < 0) | 
 | 88 | 		fatal("getgroups: %.100s", strerror(errno)); | 
| Damien Miller | a811d9a | 2004-02-24 13:05:11 +1100 | [diff] [blame] | 89 | 	if (saved_egroupslen > 0) { | 
| Darren Tucker | d1680d3 | 2015-04-30 09:18:11 +1000 | [diff] [blame] | 90 | 		saved_egroups = xreallocarray(saved_egroups, | 
| Damien Miller | 3681209 | 2006-03-26 14:22:47 +1100 | [diff] [blame] | 91 | 		    saved_egroupslen, sizeof(gid_t)); | 
| Damien Miller | a811d9a | 2004-02-24 13:05:11 +1100 | [diff] [blame] | 92 | 		if (getgroups(saved_egroupslen, saved_egroups) < 0) | 
 | 93 | 			fatal("getgroups: %.100s", strerror(errno)); | 
 | 94 | 	} else { /* saved_egroupslen == 0 */ | 
| Darren Tucker | f60845f | 2013-06-02 08:07:31 +1000 | [diff] [blame] | 95 | 		free(saved_egroups); | 
| djm@openbsd.org | 26f96ca | 2018-06-15 07:01:11 +0000 | [diff] [blame] | 96 | 		saved_egroups = NULL; | 
| Damien Miller | a811d9a | 2004-02-24 13:05:11 +1100 | [diff] [blame] | 97 | 	} | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 98 |  | 
 | 99 | 	/* set and save the user's groups */ | 
| djm@openbsd.org | 26f96ca | 2018-06-15 07:01:11 +0000 | [diff] [blame] | 100 | 	if (user_groupslen == -1 || user_groups_uid != pw->pw_uid) { | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 101 | 		if (initgroups(pw->pw_name, pw->pw_gid) < 0) | 
 | 102 | 			fatal("initgroups: %s: %.100s", pw->pw_name, | 
 | 103 | 			    strerror(errno)); | 
| Damien Miller | a811d9a | 2004-02-24 13:05:11 +1100 | [diff] [blame] | 104 |  | 
 | 105 | 		user_groupslen = getgroups(0, NULL); | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 106 | 		if (user_groupslen < 0) | 
 | 107 | 			fatal("getgroups: %.100s", strerror(errno)); | 
| Damien Miller | a811d9a | 2004-02-24 13:05:11 +1100 | [diff] [blame] | 108 | 		if (user_groupslen > 0) { | 
| Darren Tucker | d1680d3 | 2015-04-30 09:18:11 +1000 | [diff] [blame] | 109 | 			user_groups = xreallocarray(user_groups, | 
| Damien Miller | 3681209 | 2006-03-26 14:22:47 +1100 | [diff] [blame] | 110 | 			    user_groupslen, sizeof(gid_t)); | 
| Damien Miller | a811d9a | 2004-02-24 13:05:11 +1100 | [diff] [blame] | 111 | 			if (getgroups(user_groupslen, user_groups) < 0) | 
 | 112 | 				fatal("getgroups: %.100s", strerror(errno)); | 
 | 113 | 		} else { /* user_groupslen == 0 */ | 
| Darren Tucker | f60845f | 2013-06-02 08:07:31 +1000 | [diff] [blame] | 114 | 			free(user_groups); | 
| djm@openbsd.org | 26f96ca | 2018-06-15 07:01:11 +0000 | [diff] [blame] | 115 | 			user_groups = NULL; | 
| Damien Miller | a811d9a | 2004-02-24 13:05:11 +1100 | [diff] [blame] | 116 | 		} | 
| djm@openbsd.org | 26f96ca | 2018-06-15 07:01:11 +0000 | [diff] [blame] | 117 | 		user_groups_uid = pw->pw_uid; | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 118 | 	} | 
 | 119 | 	/* Set the effective uid to the given (unprivileged) uid. */ | 
| dtucker@openbsd.org | 882f8bf | 2015-06-24 01:49:19 +0000 | [diff] [blame] | 120 | 	if (setgroups(user_groupslen, user_groups) < 0) | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 121 | 		fatal("setgroups: %.100s", strerror(errno)); | 
| Ben Lindstrom | 4468b26 | 2001-04-26 23:03:37 +0000 | [diff] [blame] | 122 | #ifndef SAVED_IDS_WORK_WITH_SETEUID | 
 | 123 | 	/* Propagate the privileged gid to all of our gids. */ | 
 | 124 | 	if (setgid(getegid()) < 0) | 
 | 125 | 		debug("setgid %u: %.100s", (u_int) getegid(), strerror(errno)); | 
 | 126 | 	/* Propagate the privileged uid to all of our uids. */ | 
 | 127 | 	if (setuid(geteuid()) < 0) | 
 | 128 | 		debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno)); | 
 | 129 | #endif /* SAVED_IDS_WORK_WITH_SETEUID */ | 
| Ben Lindstrom | f52373f | 2001-04-08 18:38:04 +0000 | [diff] [blame] | 130 | 	if (setegid(pw->pw_gid) < 0) | 
| Ben Lindstrom | abff1dd | 2002-06-06 20:38:49 +0000 | [diff] [blame] | 131 | 		fatal("setegid %u: %.100s", (u_int)pw->pw_gid, | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 132 | 		    strerror(errno)); | 
 | 133 | 	if (seteuid(pw->pw_uid) == -1) | 
| Ben Lindstrom | abff1dd | 2002-06-06 20:38:49 +0000 | [diff] [blame] | 134 | 		fatal("seteuid %u: %.100s", (u_int)pw->pw_uid, | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 135 | 		    strerror(errno)); | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 136 | } | 
| Ben Lindstrom | 768f975 | 2001-04-25 06:27:11 +0000 | [diff] [blame] | 137 |  | 
| Damien Miller | 2e5fe88 | 2006-06-13 13:10:00 +1000 | [diff] [blame] | 138 | void | 
 | 139 | permanently_drop_suid(uid_t uid) | 
 | 140 | { | 
| Damien Miller | 4626cba | 2016-01-08 14:24:56 +1100 | [diff] [blame] | 141 | #ifndef NO_UID_RESTORATION_TEST | 
| Damien Miller | 2e5fe88 | 2006-06-13 13:10:00 +1000 | [diff] [blame] | 142 | 	uid_t old_uid = getuid(); | 
| Darren Tucker | 89c532d | 2014-01-18 20:43:49 +1100 | [diff] [blame] | 143 | #endif | 
| Damien Miller | 2e5fe88 | 2006-06-13 13:10:00 +1000 | [diff] [blame] | 144 |  | 
 | 145 | 	debug("permanently_drop_suid: %u", (u_int)uid); | 
| Damien Miller | 2e5fe88 | 2006-06-13 13:10:00 +1000 | [diff] [blame] | 146 | 	if (setresuid(uid, uid, uid) < 0) | 
 | 147 | 		fatal("setresuid %u: %.100s", (u_int)uid, strerror(errno)); | 
| Damien Miller | 2e5fe88 | 2006-06-13 13:10:00 +1000 | [diff] [blame] | 148 |  | 
| Damien Miller | 4626cba | 2016-01-08 14:24:56 +1100 | [diff] [blame] | 149 | #ifndef NO_UID_RESTORATION_TEST | 
 | 150 | 	/* | 
 | 151 | 	 * Try restoration of UID if changed (test clearing of saved uid). | 
 | 152 | 	 * | 
 | 153 | 	 * Note that we don't do this on Cygwin, or on Solaris-based platforms | 
 | 154 | 	 * where fine-grained privileges are available (the user might be | 
 | 155 | 	 * deliberately allowed the right to setuid back to root). | 
 | 156 | 	 */ | 
| Damien Miller | 2e5fe88 | 2006-06-13 13:10:00 +1000 | [diff] [blame] | 157 | 	if (old_uid != uid && | 
 | 158 | 	    (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) | 
 | 159 | 		fatal("%s: was able to restore old [e]uid", __func__); | 
 | 160 | #endif | 
 | 161 |  | 
 | 162 | 	/* Verify UID drop was successful */ | 
 | 163 | 	if (getuid() != uid || geteuid() != uid) { | 
 | 164 | 		fatal("%s: euid incorrect uid:%u euid:%u (should be %u)", | 
 | 165 | 		    __func__, (u_int)getuid(), (u_int)geteuid(), (u_int)uid); | 
 | 166 | 	} | 
 | 167 | } | 
 | 168 |  | 
| Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 169 | /* | 
| Ben Lindstrom | ee2786a | 2001-04-22 17:08:00 +0000 | [diff] [blame] | 170 |  * Restores to the original (privileged) uid. | 
| Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 171 |  */ | 
| Damien Miller | 4af5130 | 2000-04-16 11:18:38 +1000 | [diff] [blame] | 172 | void | 
| Ben Lindstrom | 46c1622 | 2000-12-22 01:43:59 +0000 | [diff] [blame] | 173 | restore_uid(void) | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 174 | { | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 175 | 	/* it's a no-op unless privileged */ | 
| Ben Lindstrom | 1fa330c | 2002-07-23 21:29:49 +0000 | [diff] [blame] | 176 | 	if (!privileged) { | 
 | 177 | 		debug("restore_uid: (unprivileged)"); | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 178 | 		return; | 
| Ben Lindstrom | 1fa330c | 2002-07-23 21:29:49 +0000 | [diff] [blame] | 179 | 	} | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 180 | 	if (!temporarily_use_uid_effective) | 
 | 181 | 		fatal("restore_uid: temporarily_use_uid not effective"); | 
| Ben Lindstrom | 4468b26 | 2001-04-26 23:03:37 +0000 | [diff] [blame] | 182 |  | 
 | 183 | #ifdef SAVED_IDS_WORK_WITH_SETEUID | 
| Ben Lindstrom | 18d2b5d | 2002-07-30 19:32:07 +0000 | [diff] [blame] | 184 | 	debug("restore_uid: %u/%u", (u_int)saved_euid, (u_int)saved_egid); | 
| Ben Lindstrom | ee2786a | 2001-04-22 17:08:00 +0000 | [diff] [blame] | 185 | 	/* Set the effective uid back to the saved privileged uid. */ | 
| Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 186 | 	if (seteuid(saved_euid) < 0) | 
| Ben Lindstrom | abff1dd | 2002-06-06 20:38:49 +0000 | [diff] [blame] | 187 | 		fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno)); | 
| Ben Lindstrom | 4468b26 | 2001-04-26 23:03:37 +0000 | [diff] [blame] | 188 | 	if (setegid(saved_egid) < 0) | 
| Ben Lindstrom | abff1dd | 2002-06-06 20:38:49 +0000 | [diff] [blame] | 189 | 		fatal("setegid %u: %.100s", (u_int)saved_egid, strerror(errno)); | 
| Ben Lindstrom | 4468b26 | 2001-04-26 23:03:37 +0000 | [diff] [blame] | 190 | #else /* SAVED_IDS_WORK_WITH_SETEUID */ | 
 | 191 | 	/* | 
 | 192 | 	 * We are unable to restore the real uid to its unprivileged value. | 
 | 193 | 	 * Propagate the real uid (usually more privileged) to effective uid | 
 | 194 | 	 * as well. | 
 | 195 | 	 */ | 
 | 196 | 	setuid(getuid()); | 
 | 197 | 	setgid(getgid()); | 
 | 198 | #endif /* SAVED_IDS_WORK_WITH_SETEUID */ | 
 | 199 |  | 
| dtucker@openbsd.org | 7ed01a9 | 2015-06-24 01:49:19 +0000 | [diff] [blame] | 200 | 	if (setgroups(saved_egroupslen, saved_egroups) < 0) | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 201 | 		fatal("setgroups: %.100s", strerror(errno)); | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 202 | 	temporarily_use_uid_effective = 0; | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 203 | } | 
 | 204 |  | 
| Damien Miller | 95def09 | 1999-11-25 00:26:21 +1100 | [diff] [blame] | 205 | /* | 
 | 206 |  * Permanently sets all uids to the given uid.  This cannot be | 
 | 207 |  * called while temporarily_use_uid is effective. | 
 | 208 |  */ | 
| Damien Miller | 4af5130 | 2000-04-16 11:18:38 +1000 | [diff] [blame] | 209 | void | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 210 | permanently_set_uid(struct passwd *pw) | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 211 | { | 
| Damien Miller | 4626cba | 2016-01-08 14:24:56 +1100 | [diff] [blame] | 212 | #ifndef NO_UID_RESTORATION_TEST | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 213 | 	uid_t old_uid = getuid(); | 
 | 214 | 	gid_t old_gid = getgid(); | 
| Darren Tucker | 89c532d | 2014-01-18 20:43:49 +1100 | [diff] [blame] | 215 | #endif | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 216 |  | 
| Damien Miller | 6b4069a | 2006-06-13 13:05:15 +1000 | [diff] [blame] | 217 | 	if (pw == NULL) | 
 | 218 | 		fatal("permanently_set_uid: no user given"); | 
| Ben Lindstrom | 3fcf1a2 | 2001-04-08 18:26:59 +0000 | [diff] [blame] | 219 | 	if (temporarily_use_uid_effective) | 
| Ben Lindstrom | ca8943e | 2002-06-06 20:42:04 +0000 | [diff] [blame] | 220 | 		fatal("permanently_set_uid: temporarily_use_uid effective"); | 
| Ben Lindstrom | 1fa330c | 2002-07-23 21:29:49 +0000 | [diff] [blame] | 221 | 	debug("permanently_set_uid: %u/%u", (u_int)pw->pw_uid, | 
 | 222 | 	    (u_int)pw->pw_gid); | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 223 |  | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 224 | 	if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) < 0) | 
 | 225 | 		fatal("setresgid %u: %.100s", (u_int)pw->pw_gid, strerror(errno)); | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 226 |  | 
| Damien Miller | 1598d6b | 2009-01-21 16:04:24 +1100 | [diff] [blame] | 227 | #ifdef __APPLE__ | 
 | 228 | 	/* | 
 | 229 | 	 * OS X requires initgroups after setgid to opt back into | 
 | 230 | 	 * memberd support for >16 supplemental groups. | 
 | 231 | 	 */ | 
 | 232 | 	if (initgroups(pw->pw_name, pw->pw_gid) < 0) | 
 | 233 | 		fatal("initgroups %.100s %u: %.100s", | 
 | 234 | 		    pw->pw_name, (u_int)pw->pw_gid, strerror(errno)); | 
 | 235 | #endif | 
 | 236 |  | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 237 | 	if (setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid) < 0) | 
 | 238 | 		fatal("setresuid %u: %.100s", (u_int)pw->pw_uid, strerror(errno)); | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 239 |  | 
| Damien Miller | 4626cba | 2016-01-08 14:24:56 +1100 | [diff] [blame] | 240 | #ifndef NO_UID_RESTORATION_TEST | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 241 | 	/* Try restoration of GID if changed (test clearing of saved gid) */ | 
| Darren Tucker | 35beadd | 2004-10-19 16:33:33 +1000 | [diff] [blame] | 242 | 	if (old_gid != pw->pw_gid && pw->pw_uid != 0 && | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 243 | 	    (setgid(old_gid) != -1 || setegid(old_gid) != -1)) | 
| Darren Tucker | 400b878 | 2003-06-06 10:46:04 +1000 | [diff] [blame] | 244 | 		fatal("%s: was able to restore old [e]gid", __func__); | 
| Darren Tucker | 35beadd | 2004-10-19 16:33:33 +1000 | [diff] [blame] | 245 | #endif | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 246 |  | 
 | 247 | 	/* Verify GID drop was successful */ | 
 | 248 | 	if (getgid() != pw->pw_gid || getegid() != pw->pw_gid) { | 
| Damien Miller | a8e06ce | 2003-11-21 23:48:55 +1100 | [diff] [blame] | 249 | 		fatal("%s: egid incorrect gid:%u egid:%u (should be %u)", | 
 | 250 | 		    __func__, (u_int)getgid(), (u_int)getegid(), | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 251 | 		    (u_int)pw->pw_gid); | 
 | 252 | 	} | 
 | 253 |  | 
| Damien Miller | 4626cba | 2016-01-08 14:24:56 +1100 | [diff] [blame] | 254 | #ifndef NO_UID_RESTORATION_TEST | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 255 | 	/* Try restoration of UID if changed (test clearing of saved uid) */ | 
| Damien Miller | a8e06ce | 2003-11-21 23:48:55 +1100 | [diff] [blame] | 256 | 	if (old_uid != pw->pw_uid && | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 257 | 	    (setuid(old_uid) != -1 || seteuid(old_uid) != -1)) | 
| Darren Tucker | 400b878 | 2003-06-06 10:46:04 +1000 | [diff] [blame] | 258 | 		fatal("%s: was able to restore old [e]uid", __func__); | 
| Darren Tucker | fbe3b36 | 2003-09-22 12:54:37 +1000 | [diff] [blame] | 259 | #endif | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 260 |  | 
 | 261 | 	/* Verify UID drop was successful */ | 
 | 262 | 	if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid) { | 
| Damien Miller | a8e06ce | 2003-11-21 23:48:55 +1100 | [diff] [blame] | 263 | 		fatal("%s: euid incorrect uid:%u euid:%u (should be %u)", | 
 | 264 | 		    __func__, (u_int)getuid(), (u_int)geteuid(), | 
| Damien Miller | 5fe46a4 | 2003-06-05 09:53:31 +1000 | [diff] [blame] | 265 | 		    (u_int)pw->pw_uid); | 
 | 266 | 	} | 
| Damien Miller | d4a8b7e | 1999-10-27 13:42:43 +1000 | [diff] [blame] | 267 | } |