[BACK]Return to local_passwd.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / passwd

Annotation of src/usr.bin/passwd/local_passwd.c, Revision 1.63

1.63    ! robert      1: /*     $OpenBSD: local_passwd.c,v 1.62 2021/10/24 21:24:17 deraadt Exp $       */
1.3       deraadt     2:
1.1       deraadt     3: /*-
                      4:  * Copyright (c) 1990 The Regents of the University of California.
                      5:  * All rights reserved.
                      6:  *
                      7:  * Redistribution and use in source and binary forms, with or without
                      8:  * modification, are permitted provided that the following conditions
                      9:  * are met:
                     10:  * 1. Redistributions of source code must retain the above copyright
                     11:  *    notice, this list of conditions and the following disclaimer.
                     12:  * 2. Redistributions in binary form must reproduce the above copyright
                     13:  *    notice, this list of conditions and the following disclaimer in the
                     14:  *    documentation and/or other materials provided with the distribution.
1.29      millert    15:  * 3. Neither the name of the University nor the names of its contributors
1.1       deraadt    16:  *    may be used to endorse or promote products derived from this software
                     17:  *    without specific prior written permission.
                     18:  *
                     19:  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
                     20:  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
                     21:  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
                     22:  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
                     23:  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
                     24:  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
                     25:  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
                     26:  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
                     27:  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
                     28:  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
                     29:  * SUCH DAMAGE.
                     30:  */
                     31:
                     32: #include <sys/types.h>
1.2       deraadt    33: #include <sys/stat.h>
1.21      millert    34: #include <sys/uio.h>
                     35:
1.7       weingart   36: #include <err.h>
1.1       deraadt    37: #include <errno.h>
1.21      millert    38: #include <fcntl.h>
1.54      mestre     39: #include <paths.h>
1.21      millert    40: #include <pwd.h>
1.1       deraadt    41: #include <stdio.h>
1.28      deraadt    42: #include <stdlib.h>
1.21      millert    43: #include <signal.h>
1.1       deraadt    44: #include <string.h>
1.2       deraadt    45: #include <unistd.h>
                     46: #include <util.h>
1.14      millert    47: #include <login_cap.h>
1.50      tedu       48: #include <readpassphrase.h>
1.1       deraadt    49:
1.49      tedu       50: #define UNCHANGED_MSG  "Password unchanged."
1.27      millert    51:
1.7       weingart   52: static uid_t uid;
1.33      millert    53: extern int pwd_check(login_cap_t *, char *);
                     54: extern int pwd_gettries(login_cap_t *);
1.14      millert    55:
1.39      djm        56: int local_passwd(char *, int);
1.25      millert    57: char *getnewpasswd(struct passwd *, login_cap_t *, int);
                     58: void kbintr(int);
1.1       deraadt    59:
1.7       weingart   60: int
1.26      deraadt    61: local_passwd(char *uname, int authenticated)
1.1       deraadt    62: {
1.32      millert    63:        struct passwd *pw, *opw;
1.14      millert    64:        login_cap_t *lc;
1.15      millert    65:        sigset_t fullset;
                     66:        time_t period;
1.21      millert    67:        int i, pfd, tfd = -1;
1.20      millert    68:        int pwflags = _PASSWORD_OMITV7;
1.1       deraadt    69:
1.47      tim        70:        if (!(pw = getpwnam_shadow(uname))) {
1.7       weingart   71:                warnx("unknown user %s.", uname);
1.1       deraadt    72:                return(1);
                     73:        }
1.46      deraadt    74:
1.57      semarie    75:        if (unveil(_PATH_MASTERPASSWD_LOCK, "rwc") == -1)
1.59      beck       76:                err(1, "unveil %s", _PATH_MASTERPASSWD_LOCK);
1.54      mestre     77:        if (unveil(_PATH_MASTERPASSWD, "r") == -1)
1.59      beck       78:                err(1, "unveil %s", _PATH_MASTERPASSWD);
1.55      mestre     79:        if (unveil(_PATH_LOGIN_CONF, "r") == -1)
1.59      beck       80:                err(1, "unveil %s", _PATH_LOGIN_CONF);
1.57      semarie    81:        if (unveil(_PATH_LOGIN_CONF ".db", "r") == -1)
1.59      beck       82:                err(1, "unveil %s.db", _PATH_LOGIN_CONF);
1.63    ! robert     83:        if (unveil(_PATH_LOGIN_CONF_D, "r") == -1)
        !            84:                err(1, "unveil %s", _PATH_LOGIN_CONF_D);
1.54      mestre     85:        if (unveil(_PATH_BSHELL, "x") == -1)
1.59      beck       86:                err(1, "unveil %s", _PATH_BSHELL);
1.58      anton      87:        if (unveil(_PATH_SHELLS, "r") == -1)
1.59      beck       88:                err(1, "unveil %s", _PATH_SHELLS);
1.54      mestre     89:        if (unveil(_PATH_PWD_MKDB, "x") == -1)
1.59      beck       90:                err(1, "unveil %s", _PATH_PWD_MKDB);
1.46      deraadt    91:        if (pledge("stdio rpath wpath cpath getpw tty id proc exec", NULL) == -1)
                     92:                err(1, "pledge");
                     93:
1.32      millert    94:        if ((opw = pw_dup(pw)) == NULL) {
                     95:                warn(NULL);
                     96:                return(1);
                     97:        }
1.14      millert    98:        if ((lc = login_getclass(pw->pw_class)) == NULL) {
                     99:                warnx("unable to get login class for user %s.", uname);
1.36      moritz    100:                free(opw);
1.14      millert   101:                return(1);
                    102:        }
1.1       deraadt   103:
1.13      millert   104:        uid = authenticated ? pw->pw_uid : getuid();
1.1       deraadt   105:        if (uid && uid != pw->pw_uid) {
1.8       millert   106:                warnx("login/uid mismatch, username argument required.");
1.36      moritz    107:                free(opw);
1.1       deraadt   108:                return(1);
                    109:        }
                    110:
1.14      millert   111:        /* Get the new password. */
                    112:        pw->pw_passwd = getnewpasswd(pw, lc, authenticated);
                    113:
1.46      deraadt   114:        if (pledge("stdio rpath wpath cpath getpw id proc exec", NULL) == -1)
                    115:                err(1, "pledge");
                    116:
1.14      millert   117:        /* Reset password change time based on login.conf. */
1.48      guenther  118:        period = (time_t)login_getcaptime(lc, "passwordtime", 0, 0);
1.19      millert   119:        if (period > 0) {
1.14      millert   120:                pw->pw_change = time(NULL) + period;
1.19      millert   121:        } else {
                    122:                /*
                    123:                 * If the pw change time is the same we only need
                    124:                 * to update the spwd.db file.
                    125:                 */
                    126:                if (pw->pw_change != 0)
                    127:                        pw->pw_change = 0;
                    128:                else
1.20      millert   129:                        pwflags = _PASSWORD_SECUREONLY;
1.19      millert   130:        }
1.14      millert   131:
1.15      millert   132:        /* Drop user's real uid and block all signals to avoid a DoS. */
                    133:        setuid(0);
                    134:        sigfillset(&fullset);
                    135:        sigdelset(&fullset, SIGINT);
                    136:        sigprocmask(SIG_BLOCK, &fullset, NULL);
                    137:
1.46      deraadt   138:        if (pledge("stdio rpath wpath cpath proc exec", NULL) == -1)
                    139:                err(1, "pledge");
                    140:
1.15      millert   141:        /* Get a lock on the passwd file and open it. */
                    142:        pw_init();
1.21      millert   143:        for (i = 1; (tfd = pw_lock(0)) == -1; i++) {
                    144:                if (i == 4)
1.38      jsing     145:                        (void)fputs("Attempting to lock password file, "
1.21      millert   146:                            "please wait or press ^C to abort", stderr);
                    147:                (void)signal(SIGINT, kbintr);
                    148:                if (i % 16 == 0)
1.15      millert   149:                        fputc('.', stderr);
1.21      millert   150:                usleep(250000);
1.15      millert   151:                (void)signal(SIGINT, SIG_IGN);
                    152:        }
1.21      millert   153:        if (i >= 4)
                    154:                fputc('\n', stderr);
1.62      deraadt   155:        pfd = open(_PATH_MASTERPASSWD, O_RDONLY | O_CLOEXEC);
1.56      deraadt   156:        if (pfd == -1)
1.15      millert   157:                pw_error(_PATH_MASTERPASSWD, 1, 1);
                    158:
1.18      millert   159:        /* Update master.passwd file and rebuild spwd.db. */
1.32      millert   160:        pw_copy(pfd, tfd, pw, opw);
                    161:        free(opw);
1.56      deraadt   162:        if (pw_mkdb(uname, pwflags) == -1)
1.19      millert   163:                pw_error(NULL, 0, 1);
1.61      robert    164:
                    165:        fprintf(stderr, "passwd: password updated successfully\n");
1.14      millert   166:
1.1       deraadt   167:        return(0);
                    168: }
                    169:
                    170: char *
1.26      deraadt   171: getnewpasswd(struct passwd *pw, login_cap_t *lc, int authenticated)
1.1       deraadt   172: {
1.43      tedu      173:        static char hash[_PASSWORD_LEN];
1.52      tedu      174:        char newpass[1024];
1.44      tedu      175:        char *p, *pref;
1.11      provos    176:        int tries, pwd_tries;
1.24      millert   177:        sig_t saveint, savequit;
1.1       deraadt   178:
1.24      millert   179:        saveint = signal(SIGINT, kbintr);
                    180:        savequit = signal(SIGQUIT, kbintr);
1.23      millert   181:
1.13      millert   182:        if (!authenticated) {
1.60      robert    183:                fprintf(stderr, "Changing password for %s.\n", pw->pw_name);
1.27      millert   184:                if (uid != 0 && pw->pw_passwd[0] != '\0') {
1.52      tedu      185:                        char oldpass[1024];
1.50      tedu      186:
                    187:                        p = readpassphrase("Old password:", oldpass,
                    188:                            sizeof(oldpass), RPP_ECHO_OFF);
1.31      millert   189:                        if (p == NULL || *p == '\0') {
1.60      robert    190:                                fprintf(stderr, "%s\n", UNCHANGED_MSG);
1.27      millert   191:                                pw_abort();
1.31      millert   192:                                exit(p == NULL ? 1 : 0);
1.27      millert   193:                        }
1.42      tedu      194:                        if (crypt_checkpass(p, pw->pw_passwd) != 0) {
1.27      millert   195:                                errno = EACCES;
1.51      gsoares   196:                                explicit_bzero(oldpass, sizeof(oldpass));
1.27      millert   197:                                pw_error(NULL, 1, 1);
                    198:                        }
1.51      gsoares   199:                        explicit_bzero(oldpass, sizeof(oldpass));
1.13      millert   200:                }
1.1       deraadt   201:        }
1.26      deraadt   202:
1.33      millert   203:        pwd_tries = pwd_gettries(lc);
1.1       deraadt   204:
1.50      tedu      205:        for (newpass[0] = '\0', tries = 0;;) {
1.52      tedu      206:                char repeat[1024];
1.50      tedu      207:
                    208:                p = readpassphrase("New password:", newpass, sizeof(newpass),
                    209:                    RPP_ECHO_OFF);
1.31      millert   210:                if (p == NULL || *p == '\0') {
1.60      robert    211:                        fprintf(stderr, "%s\n", UNCHANGED_MSG);
1.27      millert   212:                        pw_abort();
1.31      millert   213:                        exit(p == NULL ? 1 : 0);
1.9       deraadt   214:                }
                    215:                if (strcmp(p, "s/key") == 0) {
1.60      robert    216:                        fprintf(stderr, "That password collides with a system feature. Choose another.\n");
1.9       deraadt   217:                        continue;
1.1       deraadt   218:                }
1.26      deraadt   219:
1.37      deraadt   220:                if ((tries++ < pwd_tries || pwd_tries == 0) &&
                    221:                    pwd_check(lc, p) == 0)
1.1       deraadt   222:                        continue;
1.50      tedu      223:                p = readpassphrase("Retype new password:", repeat, sizeof(repeat),
                    224:                    RPP_ECHO_OFF);
1.53      millert   225:                if (p != NULL && strcmp(newpass, p) == 0) {
                    226:                        explicit_bzero(repeat, sizeof(repeat));
1.1       deraadt   227:                        break;
1.53      millert   228:                }
1.60      robert    229:                fprintf(stderr, "Mismatch; try again, EOF to quit.\n");
1.53      millert   230:                explicit_bzero(repeat, sizeof(repeat));
1.51      gsoares   231:                explicit_bzero(newpass, sizeof(newpass));
1.1       deraadt   232:        }
1.43      tedu      233:
1.24      millert   234:        (void)signal(SIGINT, saveint);
                    235:        (void)signal(SIGQUIT, savequit);
1.23      millert   236:
1.44      tedu      237:        pref = login_getcapstr(lc, "localcipher", NULL, NULL);
1.50      tedu      238:        if (crypt_newhash(newpass, pref, hash, sizeof(hash)) != 0) {
1.60      robert    239:                fprintf(stderr, "Couldn't generate hash.\n");
1.51      gsoares   240:                explicit_bzero(newpass, sizeof(newpass));
1.43      tedu      241:                pw_error(NULL, 0, 0);
                    242:        }
1.51      gsoares   243:        explicit_bzero(newpass, sizeof(newpass));
1.44      tedu      244:        free(pref);
1.43      tedu      245:        return hash;
1.15      millert   246: }
                    247:
                    248: void
1.26      deraadt   249: kbintr(int signo)
1.15      millert   250: {
1.49      tedu      251:        dprintf(STDOUT_FILENO, "\n%s\n", UNCHANGED_MSG);
1.27      millert   252:        _exit(0);
1.1       deraadt   253: }