blob: 8f3acee2634b156973089248936aed4695e8e88d [file] [log] [blame]
Damien Millerbac2d8a2000-09-05 16:13:06 +11001/*
Kevin Steveseb363022002-04-15 22:00:51 +00002 * Copyright (c) 2000, 2001, Corinna Vinschen <vinschen@cygnus.com>
Damien Millerbac2d8a2000-09-05 16:13:06 +11003 *
Kevin Steveseb363022002-04-15 22:00:51 +00004 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 *
13 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Damien Millerbac2d8a2000-09-05 16:13:06 +110023 *
24 * Created: Sat Sep 02 12:17:00 2000 cv
25 *
26 * This file contains functions for forcing opened file descriptors to
27 * binary mode on Windows systems.
28 */
29
Damien Millere9cf3572001-02-09 12:55:35 +110030#include "includes.h"
31
Damien Millerbac2d8a2000-09-05 16:13:06 +110032#ifdef HAVE_CYGWIN
Damien Miller72c9a7e2000-09-24 11:10:13 +110033
Damien Millerbac2d8a2000-09-05 16:13:06 +110034#include <fcntl.h>
Damien Millerb70b61f2000-09-16 16:25:12 +110035#include <stdlib.h>
Ben Lindstromcff94be2001-07-18 16:19:48 +000036#include <sys/utsname.h>
Damien Millerb70b61f2000-09-16 16:25:12 +110037#include <sys/vfs.h>
38#include <windows.h>
Darren Tucker14c372d2004-08-30 20:42:08 +100039#include "xmalloc.h"
Damien Millerb70b61f2000-09-16 16:25:12 +110040#define is_winnt (GetVersion() < 0x80000000)
Damien Millerbac2d8a2000-09-05 16:13:06 +110041
Ben Lindstromcff94be2001-07-18 16:19:48 +000042#define ntsec_on(c) ((c) && strstr((c),"ntsec") && !strstr((c),"nontsec"))
Ben Lindstrom224313c2002-11-09 15:59:27 +000043#define ntsec_off(c) ((c) && strstr((c),"nontsec"))
Ben Lindstromcff94be2001-07-18 16:19:48 +000044#define ntea_on(c) ((c) && strstr((c),"ntea") && !strstr((c),"nontea"))
45
Damien Miller2deb3f62001-02-18 12:30:55 +110046#if defined(open) && open == binary_open
47# undef open
48#endif
49#if defined(pipe) && open == binary_pipe
50# undef pipe
51#endif
52
Damien Miller31741252003-05-19 00:13:38 +100053int
54binary_open(const char *filename, int flags, ...)
Damien Millerbac2d8a2000-09-05 16:13:06 +110055{
Damien Miller2deb3f62001-02-18 12:30:55 +110056 va_list ap;
57 mode_t mode;
58
59 va_start(ap, flags);
60 mode = va_arg(ap, mode_t);
61 va_end(ap);
Damien Miller31741252003-05-19 00:13:38 +100062 return (open(filename, flags | O_BINARY, mode));
Damien Millerbac2d8a2000-09-05 16:13:06 +110063}
64
Damien Miller31741252003-05-19 00:13:38 +100065int
66binary_pipe(int fd[2])
Damien Millerbac2d8a2000-09-05 16:13:06 +110067{
Damien Miller72c9a7e2000-09-24 11:10:13 +110068 int ret = pipe(fd);
69
70 if (!ret) {
Damien Miller31741252003-05-19 00:13:38 +100071 setmode(fd[0], O_BINARY);
72 setmode(fd[1], O_BINARY);
Damien Miller72c9a7e2000-09-24 11:10:13 +110073 }
Damien Miller31741252003-05-19 00:13:38 +100074 return (ret);
Damien Millerb70b61f2000-09-16 16:25:12 +110075}
76
Ben Lindstrom224313c2002-11-09 15:59:27 +000077#define HAS_CREATE_TOKEN 1
78#define HAS_NTSEC_BY_DEFAULT 2
Damien Miller2eb42362004-04-18 21:15:43 +100079#define HAS_CREATE_TOKEN_WO_NTSEC 3
Ben Lindstrom224313c2002-11-09 15:59:27 +000080
Damien Miller31741252003-05-19 00:13:38 +100081static int
82has_capability(int what)
Ben Lindstrom224313c2002-11-09 15:59:27 +000083{
Ben Lindstrom224313c2002-11-09 15:59:27 +000084 static int inited;
85 static int has_create_token;
86 static int has_ntsec_by_default;
Damien Miller2eb42362004-04-18 21:15:43 +100087 static int has_create_token_wo_ntsec;
Ben Lindstrom224313c2002-11-09 15:59:27 +000088
Damien Miller31741252003-05-19 00:13:38 +100089 /*
90 * has_capability() basically calls uname() and checks if
91 * specific capabilities of Cygwin can be evaluated from that.
92 * This simplifies the calling functions which only have to ask
93 * for a capability using has_capability() instead of having
94 * to figure that out by themselves.
95 */
Ben Lindstrom224313c2002-11-09 15:59:27 +000096 if (!inited) {
97 struct utsname uts;
Ben Lindstrom224313c2002-11-09 15:59:27 +000098
99 if (!uname(&uts)) {
Damien Miller31741252003-05-19 00:13:38 +1000100 int major_high = 0, major_low = 0, minor = 0;
101 int api_major_version = 0, api_minor_version = 0;
Ben Lindstrom224313c2002-11-09 15:59:27 +0000102 char *c;
103
104 sscanf(uts.release, "%d.%d.%d", &major_high,
Damien Miller31741252003-05-19 00:13:38 +1000105 &major_low, &minor);
106 if ((c = strchr(uts.release, '(')) != NULL) {
Ben Lindstrom224313c2002-11-09 15:59:27 +0000107 sscanf(c + 1, "%d.%d", &api_major_version,
Damien Miller31741252003-05-19 00:13:38 +1000108 &api_minor_version);
109 }
Ben Lindstrom224313c2002-11-09 15:59:27 +0000110 if (major_high > 1 ||
111 (major_high == 1 && (major_low > 3 ||
Damien Miller31741252003-05-19 00:13:38 +1000112 (major_low == 3 && minor >= 2))))
Ben Lindstrom224313c2002-11-09 15:59:27 +0000113 has_create_token = 1;
114 if (api_major_version > 0 || api_minor_version >= 56)
115 has_ntsec_by_default = 1;
Damien Miller2eb42362004-04-18 21:15:43 +1000116 if (major_high > 1 ||
117 (major_high == 1 && major_low >= 5))
118 has_create_token_wo_ntsec = 1;
Ben Lindstrom224313c2002-11-09 15:59:27 +0000119 inited = 1;
120 }
121 }
122 switch (what) {
123 case HAS_CREATE_TOKEN:
Damien Miller31741252003-05-19 00:13:38 +1000124 return (has_create_token);
Ben Lindstrom224313c2002-11-09 15:59:27 +0000125 case HAS_NTSEC_BY_DEFAULT:
Damien Miller31741252003-05-19 00:13:38 +1000126 return (has_ntsec_by_default);
Damien Miller2eb42362004-04-18 21:15:43 +1000127 case HAS_CREATE_TOKEN_WO_NTSEC:
128 return (has_create_token_wo_ntsec);
Ben Lindstrom224313c2002-11-09 15:59:27 +0000129 }
Damien Miller31741252003-05-19 00:13:38 +1000130 return (0);
Ben Lindstrom224313c2002-11-09 15:59:27 +0000131}
132
Damien Miller31741252003-05-19 00:13:38 +1000133int
134check_nt_auth(int pwd_authenticated, struct passwd *pw)
Damien Millerb70b61f2000-09-16 16:25:12 +1100135{
136 /*
Damien Miller72c9a7e2000-09-24 11:10:13 +1100137 * The only authentication which is able to change the user
138 * context on NT systems is the password authentication. So
139 * we deny all requsts for changing the user context if another
140 * authentication method is used.
Ben Lindstromcff94be2001-07-18 16:19:48 +0000141 *
142 * This doesn't apply to Cygwin versions >= 1.3.2 anymore which
143 * uses the undocumented NtCreateToken() call to create a user
144 * token if the process has the appropriate privileges and if
145 * CYGWIN ntsec setting is on.
Damien Miller72c9a7e2000-09-24 11:10:13 +1100146 */
Ben Lindstromcff94be2001-07-18 16:19:48 +0000147 static int has_create_token = -1;
148
Damien Miller0dea79d2001-12-29 14:08:28 +1100149 if (pw == NULL)
150 return 0;
Ben Lindstromcff94be2001-07-18 16:19:48 +0000151 if (is_winnt) {
152 if (has_create_token < 0) {
Ben Lindstromcff94be2001-07-18 16:19:48 +0000153 char *cygwin = getenv("CYGWIN");
154
155 has_create_token = 0;
Ben Lindstrom224313c2002-11-09 15:59:27 +0000156 if (has_capability(HAS_CREATE_TOKEN) &&
157 (ntsec_on(cygwin) ||
Damien Miller31741252003-05-19 00:13:38 +1000158 (has_capability(HAS_NTSEC_BY_DEFAULT) &&
Damien Miller2eb42362004-04-18 21:15:43 +1000159 !ntsec_off(cygwin)) ||
160 has_capability(HAS_CREATE_TOKEN_WO_NTSEC)))
Ben Lindstrom224313c2002-11-09 15:59:27 +0000161 has_create_token = 1;
Ben Lindstromcff94be2001-07-18 16:19:48 +0000162 }
163 if (has_create_token < 1 &&
Damien Miller0dea79d2001-12-29 14:08:28 +1100164 !pwd_authenticated && geteuid() != pw->pw_uid)
Damien Miller31741252003-05-19 00:13:38 +1000165 return (0);
Ben Lindstromcff94be2001-07-18 16:19:48 +0000166 }
Damien Miller31741252003-05-19 00:13:38 +1000167 return (1);
Damien Millerb70b61f2000-09-16 16:25:12 +1100168}
169
Damien Miller31741252003-05-19 00:13:38 +1000170int
171check_ntsec(const char *filename)
Damien Millerb70b61f2000-09-16 16:25:12 +1100172{
173 char *cygwin;
Damien Miller31741252003-05-19 00:13:38 +1000174 int allow_ntea = 0, allow_ntsec = 0;
Damien Millerb70b61f2000-09-16 16:25:12 +1100175 struct statfs fsstat;
176
177 /* Windows 95/98/ME don't support file system security at all. */
178 if (!is_winnt)
Damien Miller31741252003-05-19 00:13:38 +1000179 return (0);
Damien Millerb70b61f2000-09-16 16:25:12 +1100180
181 /* Evaluate current CYGWIN settings. */
Ben Lindstromcff94be2001-07-18 16:19:48 +0000182 cygwin = getenv("CYGWIN");
183 allow_ntea = ntea_on(cygwin);
Ben Lindstrom224313c2002-11-09 15:59:27 +0000184 allow_ntsec = ntsec_on(cygwin) ||
Damien Miller31741252003-05-19 00:13:38 +1000185 (has_capability(HAS_NTSEC_BY_DEFAULT) && !ntsec_off(cygwin));
Damien Millerb70b61f2000-09-16 16:25:12 +1100186
187 /*
188 * `ntea' is an emulation of POSIX attributes. It doesn't support
189 * real file level security as ntsec on NTFS file systems does
190 * but it supports FAT filesystems. `ntea' is minimum requirement
191 * for security checks.
192 */
193 if (allow_ntea)
Damien Miller31741252003-05-19 00:13:38 +1000194 return (1);
Damien Millerb70b61f2000-09-16 16:25:12 +1100195
196 /*
197 * Retrieve file system flags. In Cygwin, file system flags are
198 * copied to f_type which has no meaning in Win32 itself.
199 */
200 if (statfs(filename, &fsstat))
Damien Miller31741252003-05-19 00:13:38 +1000201 return (1);
Damien Millerb70b61f2000-09-16 16:25:12 +1100202
203 /*
204 * Only file systems supporting ACLs are able to set permissions.
205 * `ntsec' is the setting in Cygwin which switches using of NTFS
206 * ACLs to support POSIX permissions on files.
207 */
208 if (fsstat.f_type & FS_PERSISTENT_ACLS)
Damien Miller31741252003-05-19 00:13:38 +1000209 return (allow_ntsec);
Damien Millerb70b61f2000-09-16 16:25:12 +1100210
Damien Miller31741252003-05-19 00:13:38 +1000211 return (0);
Damien Millerbac2d8a2000-09-05 16:13:06 +1100212}
Damien Miller72c9a7e2000-09-24 11:10:13 +1100213
Damien Miller31741252003-05-19 00:13:38 +1000214void
215register_9x_service(void)
Tim Ricefe1d1002001-11-26 17:19:43 -0800216{
217 HINSTANCE kerneldll;
218 DWORD (*RegisterServiceProcess)(DWORD, DWORD);
219
220 /* The service register mechanism in 9x/Me is pretty different from
221 * NT/2K/XP. In NT/2K/XP we're using a special service starter
222 * application to register and control sshd as service. This method
223 * doesn't play nicely with 9x/Me. For that reason we register here
224 * as service when running under 9x/Me. This function is only called
225 * by the child sshd when it's going to daemonize.
226 */
227 if (is_winnt)
228 return;
Damien Miller31741252003-05-19 00:13:38 +1000229 if (!(kerneldll = LoadLibrary("KERNEL32.DLL")))
Tim Ricefe1d1002001-11-26 17:19:43 -0800230 return;
Damien Miller31741252003-05-19 00:13:38 +1000231 if (!(RegisterServiceProcess = (DWORD (*)(DWORD, DWORD))
232 GetProcAddress(kerneldll, "RegisterServiceProcess")))
Tim Ricefe1d1002001-11-26 17:19:43 -0800233 return;
234 RegisterServiceProcess(0, 1);
235}
236
Darren Tucker14c372d2004-08-30 20:42:08 +1000237#define NL(x) x, (sizeof (x) - 1)
238#define WENV_SIZ (sizeof (wenv_arr) / sizeof (wenv_arr[0]))
239
240static struct wenv {
241 const char *name;
242 size_t namelen;
243} wenv_arr[] = {
244 { NL("ALLUSERSPROFILE=") },
245 { NL("COMMONPROGRAMFILES=") },
246 { NL("COMPUTERNAME=") },
247 { NL("COMSPEC=") },
Darren Tuckerae8c91e2005-05-25 19:42:10 +1000248 { NL("CYGWIN=") },
Darren Tucker14c372d2004-08-30 20:42:08 +1000249 { NL("NUMBER_OF_PROCESSORS=") },
250 { NL("OS=") },
251 { NL("PATH=") },
252 { NL("PATHEXT=") },
253 { NL("PROCESSOR_ARCHITECTURE=") },
254 { NL("PROCESSOR_IDENTIFIER=") },
255 { NL("PROCESSOR_LEVEL=") },
256 { NL("PROCESSOR_REVISION=") },
257 { NL("PROGRAMFILES=") },
258 { NL("SYSTEMDRIVE=") },
259 { NL("SYSTEMROOT=") },
260 { NL("TMP=") },
261 { NL("TEMP=") },
Darren Tuckerae8c91e2005-05-25 19:42:10 +1000262 { NL("WINDIR=") }
Darren Tucker14c372d2004-08-30 20:42:08 +1000263};
264
265char **
266fetch_windows_environment(void)
267{
268 char **e, **p;
Darren Tucker84af6152006-02-12 11:59:08 +1100269 unsigned int i, idx = 0;
Darren Tucker14c372d2004-08-30 20:42:08 +1000270
Darren Tuckerae8c91e2005-05-25 19:42:10 +1000271 p = xmalloc((WENV_SIZ + 1) * sizeof(char *));
Darren Tucker14c372d2004-08-30 20:42:08 +1000272 for (e = environ; *e != NULL; ++e) {
273 for (i = 0; i < WENV_SIZ; ++i) {
274 if (!strncmp(*e, wenv_arr[i].name, wenv_arr[i].namelen))
275 p[idx++] = *e;
276 }
277 }
278 p[idx] = NULL;
279 return p;
280}
281
282void
283free_windows_environment(char **p)
284{
285 xfree(p);
286}
287
Damien Miller72c9a7e2000-09-24 11:10:13 +1100288#endif /* HAVE_CYGWIN */