blob: 2895f0d441c63d6b91f76dd7ea724380c1c09612 [file] [log] [blame]
Ben Lindstrom51b24882002-07-04 03:08:40 +00001/*
Ben Lindstrom024f08f2002-07-07 02:17:36 +00002 *
3 * Copyright (c) 2001 Gert Doering. All rights reserved.
4 *
Ben Lindstrom51b24882002-07-04 03:08:40 +00005 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 *
25 */
Ben Lindstroma9c039c2002-02-19 20:27:55 +000026#include "includes.h"
Darren Tuckercfea2062004-02-10 15:27:34 +110027#include "auth.h"
Darren Tucker97363a82003-05-02 23:42:25 +100028#include "ssh.h"
29#include "log.h"
30#include "servconf.h"
Darren Tucker051c2702003-09-22 13:05:26 +100031#include "canohost.h"
32#include "xmalloc.h"
Darren Tuckerd7634162003-11-22 14:16:56 +110033#include "buffer.h"
Ben Lindstroma9c039c2002-02-19 20:27:55 +000034
35#ifdef _AIX
36
37#include <uinfo.h>
Darren Tuckerfc3454e2003-07-14 16:41:55 +100038#include "port-aix.h"
Ben Lindstroma9c039c2002-02-19 20:27:55 +000039
Darren Tucker97363a82003-05-02 23:42:25 +100040extern ServerOptions options;
Darren Tuckerd7634162003-11-22 14:16:56 +110041extern Buffer loginmsg;
Darren Tucker97363a82003-05-02 23:42:25 +100042
Darren Tuckere45674a2004-02-06 16:17:51 +110043# ifdef HAVE_SETAUTHDB
44static char old_registry[REGISTRY_SIZE] = "";
45# endif
46
Ben Lindstroma9c039c2002-02-19 20:27:55 +000047/*
Ben Lindstrom51b24882002-07-04 03:08:40 +000048 * AIX has a "usrinfo" area where logname and other stuff is stored -
49 * a few applications actually use this and die if it's not set
50 *
51 * NOTE: TTY= should be set, but since no one uses it and it's hard to
52 * acquire due to privsep code. We will just drop support.
Ben Lindstroma9c039c2002-02-19 20:27:55 +000053 */
54void
Ben Lindstrom51b24882002-07-04 03:08:40 +000055aix_usrinfo(struct passwd *pw)
Ben Lindstroma9c039c2002-02-19 20:27:55 +000056{
Ben Lindstroma9c039c2002-02-19 20:27:55 +000057 u_int i;
Damien Miller31741252003-05-19 00:13:38 +100058 size_t len;
Ben Lindstrom51b24882002-07-04 03:08:40 +000059 char *cp;
Ben Lindstroma9c039c2002-02-19 20:27:55 +000060
Damien Miller31741252003-05-19 00:13:38 +100061 len = sizeof("LOGNAME= NAME= ") + (2 * strlen(pw->pw_name));
62 cp = xmalloc(len);
63
Damien Miller3867bf32003-05-19 09:33:15 +100064 i = snprintf(cp, len, "LOGNAME=%s%cNAME=%s%c", pw->pw_name, '\0',
65 pw->pw_name, '\0');
Ben Lindstroma9c039c2002-02-19 20:27:55 +000066 if (usrinfo(SETUINFO, cp, i) == -1)
67 fatal("Couldn't set usrinfo: %s", strerror(errno));
68 debug3("AIX/UsrInfo: set len %d", i);
Damien Miller31741252003-05-19 00:13:38 +100069
Ben Lindstroma9c039c2002-02-19 20:27:55 +000070 xfree(cp);
71}
72
Darren Tuckerd7634162003-11-22 14:16:56 +110073# ifdef WITH_AIXAUTHENTICATE
Darren Tuckerb9aa0a02003-07-08 22:59:59 +100074/*
75 * Remove embedded newlines in string (if any).
76 * Used before logging messages returned by AIX authentication functions
77 * so the message is logged on one line.
78 */
79void
80aix_remove_embedded_newlines(char *p)
81{
82 if (p == NULL)
83 return;
84
85 for (; *p; p++) {
86 if (*p == '\n')
87 *p = ' ';
88 }
89 /* Remove trailing whitespace */
90 if (*--p == ' ')
91 *p = '\0';
92}
Darren Tuckerd7634162003-11-22 14:16:56 +110093
94/*
95 * Do authentication via AIX's authenticate routine. We loop until the
96 * reenter parameter is 0, but normally authenticate is called only once.
97 *
98 * Note: this function returns 1 on success, whereas AIX's authenticate()
99 * returns 0.
100 */
101int
Darren Tuckere3dba822004-02-10 12:50:19 +1100102sys_auth_passwd(Authctxt *ctxt, const char *password)
Darren Tuckerd7634162003-11-22 14:16:56 +1100103{
Darren Tuckere3dba822004-02-10 12:50:19 +1100104 char *authmsg = NULL, *host, *msg, *name = ctxt->pw->pw_name;
105 int authsuccess = 0, expired, reenter, result;
Darren Tuckerd7634162003-11-22 14:16:56 +1100106
107 do {
108 result = authenticate((char *)name, (char *)password, &reenter,
109 &authmsg);
110 aix_remove_embedded_newlines(authmsg);
111 debug3("AIX/authenticate result %d, msg %.100s", result,
112 authmsg);
113 } while (reenter);
114
115 if (result == 0) {
116 authsuccess = 1;
117
Darren Tuckere3dba822004-02-10 12:50:19 +1100118 host = (char *)get_canonical_hostname(options.use_dns);
119
120 /*
121 * Record successful login. We don't have a pty yet, so just
122 * label the line as "ssh"
123 */
Darren Tuckerd7634162003-11-22 14:16:56 +1100124 aix_setauthdb(name);
125 if (loginsuccess((char *)name, (char *)host, "ssh", &msg) == 0) {
126 if (msg != NULL) {
127 debug("%s: msg %s", __func__, msg);
128 buffer_append(&loginmsg, msg, strlen(msg));
129 xfree(msg);
130 }
131 }
Darren Tuckere3dba822004-02-10 12:50:19 +1100132
133 /*
134 * Check if the user's password is expired.
135 */
136 expired = passwdexpired(name, &msg);
137 if (msg && *msg) {
138 buffer_append(&loginmsg, msg, strlen(msg));
139 aix_remove_embedded_newlines(msg);
140 }
141 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg);
142
143 switch (expired) {
144 case 0: /* password not expired */
145 break;
146 case 1: /* expired, password change required */
147 ctxt->force_pwchange = 1;
148 disable_forwarding();
149 break;
150 default: /* user can't change(2) or other error (-1) */
151 logit("Password can't be changed for user %s: %.100s",
152 name, msg);
153 if (msg)
154 xfree(msg);
155 authsuccess = 0;
156 }
157
Darren Tuckere45674a2004-02-06 16:17:51 +1100158 aix_restoreauthdb();
Darren Tuckerd7634162003-11-22 14:16:56 +1100159 }
160
161 if (authmsg != NULL)
162 xfree(authmsg);
163
164 return authsuccess;
165}
Darren Tuckerb9aa0a02003-07-08 22:59:59 +1000166
Darren Tuckerd7634162003-11-22 14:16:56 +1100167# ifdef CUSTOM_FAILED_LOGIN
Darren Tucker97363a82003-05-02 23:42:25 +1000168/*
169 * record_failed_login: generic "login failed" interface function
170 */
171void
172record_failed_login(const char *user, const char *ttyname)
173{
Darren Tuckerd7634162003-11-22 14:16:56 +1100174 char *hostname = (char *)get_canonical_hostname(options.use_dns);
Damien Miller31741252003-05-19 00:13:38 +1000175
Darren Tuckerfc3454e2003-07-14 16:41:55 +1000176 if (geteuid() != 0)
177 return;
178
179 aix_setauthdb(user);
Darren Tuckerd7634162003-11-22 14:16:56 +1100180# ifdef AIX_LOGINFAILED_4ARG
Darren Tuckera0c0b632003-07-08 20:52:12 +1000181 loginfailed((char *)user, hostname, (char *)ttyname, AUDIT_FAIL_AUTH);
Darren Tuckerd7634162003-11-22 14:16:56 +1100182# else
Darren Tucker5c6a91a2003-07-14 16:21:44 +1000183 loginfailed((char *)user, hostname, (char *)ttyname);
Darren Tuckerd7634162003-11-22 14:16:56 +1100184# endif
Darren Tuckere45674a2004-02-06 16:17:51 +1100185 aix_restoreauthdb();
Darren Tucker97363a82003-05-02 23:42:25 +1000186}
Darren Tuckerd7634162003-11-22 14:16:56 +1100187# endif /* CUSTOM_FAILED_LOGIN */
Darren Tuckerfc3454e2003-07-14 16:41:55 +1000188
189/*
190 * If we have setauthdb, retrieve the password registry for the user's
Darren Tuckere45674a2004-02-06 16:17:51 +1100191 * account then feed it to setauthdb. This will mean that subsequent AIX auth
192 * functions will only use the specified loadable module. If we don't have
193 * setauthdb this is a no-op.
Darren Tuckerfc3454e2003-07-14 16:41:55 +1000194 */
195void
196aix_setauthdb(const char *user)
197{
198# ifdef HAVE_SETAUTHDB
Darren Tuckere45674a2004-02-06 16:17:51 +1100199 char *registry;
Darren Tuckerfc3454e2003-07-14 16:41:55 +1000200
201 if (setuserdb(S_READ) == -1) {
202 debug3("%s: Could not open userdb to read", __func__);
203 return;
204 }
205
206 if (getuserattr((char *)user, S_REGISTRY, &registry, SEC_CHAR) == 0) {
Darren Tuckere45674a2004-02-06 16:17:51 +1100207 if (setauthdb(registry, old_registry) == 0)
208 debug3("AIX/setauthdb set registry '%s'", registry);
Darren Tuckerfc3454e2003-07-14 16:41:55 +1000209 else
Darren Tuckere45674a2004-02-06 16:17:51 +1100210 debug3("AIX/setauthdb set registry '%s' failed: %s",
211 registry, strerror(errno));
Darren Tuckerfc3454e2003-07-14 16:41:55 +1000212 } else
213 debug3("%s: Could not read S_REGISTRY for user: %s", __func__,
214 strerror(errno));
215 enduserdb();
Darren Tuckerd7634162003-11-22 14:16:56 +1100216# endif /* HAVE_SETAUTHDB */
Darren Tuckerfc3454e2003-07-14 16:41:55 +1000217}
Ben Lindstroma9c039c2002-02-19 20:27:55 +0000218
Darren Tuckere45674a2004-02-06 16:17:51 +1100219/*
220 * Restore the user's registry settings from old_registry.
221 * Note that if the first aix_setauthdb fails, setauthdb("") is still safe
222 * (it restores the system default behaviour). If we don't have setauthdb,
223 * this is a no-op.
224 */
225void
226aix_restoreauthdb(void)
227{
228# ifdef HAVE_SETAUTHDB
229 if (setauthdb(old_registry, NULL) == 0)
230 debug3("%s: restoring old registry '%s'", __func__,
231 old_registry);
232 else
233 debug3("%s: failed to restore old registry %s", __func__,
234 old_registry);
235# endif /* HAVE_SETAUTHDB */
236}
237
Darren Tuckerd7634162003-11-22 14:16:56 +1100238# endif /* WITH_AIXAUTHENTICATE */
239
240#endif /* _AIX */