Annotation of src/usr.bin/passwd/pwd_check.c, Revision 1.14
1.14 ! deraadt 1: /* $OpenBSD: pwd_check.c,v 1.13 2013/03/02 09:07:37 ajacoutot Exp $ */
1.9 millert 2:
1.1 provos 3: /*
4: * Copyright 2000 Niels Provos <provos@citi.umich.edu>
5: * All rights reserved.
6: *
7: * Redistribution and use in source and binary forms, with or without
8: * modification, are permitted provided that the following conditions
9: * are met:
10: * 1. Redistributions of source code must retain the above copyright
11: * notice, this list of conditions and the following disclaimer.
12: * 2. Redistributions in binary form must reproduce the above copyright
13: * notice, this list of conditions and the following disclaimer in the
14: * documentation and/or other materials provided with the distribution.
15: * 3. All advertising materials mentioning features or use of this software
16: * must display the following acknowledgement:
17: * This product includes software developed by Niels Provos.
18: * 4. The name of the author may not be used to endorse or promote products
19: * derived from this software without specific prior written permission.
20: *
21: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
22: * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
23: * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
24: * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
25: * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
26: * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27: * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28: * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29: * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
30: * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31: */
32:
33: #include <sys/types.h>
34: #include <sys/wait.h>
1.2 millert 35:
36: #include <stdio.h>
1.1 provos 37: #include <stdlib.h>
1.2 millert 38: #include <string.h>
1.1 provos 39: #include <unistd.h>
40: #include <limits.h>
1.2 millert 41: #include <errno.h>
1.3 millert 42: #include <err.h>
1.1 provos 43: #include <regex.h>
44: #include <grp.h>
45: #include <paths.h>
1.4 millert 46: #include <login_cap.h>
1.11 djm 47: #include <signal.h>
1.12 djm 48:
49: int pwd_check(login_cap_t *, char *);
50: int pwd_gettries(login_cap_t *);
1.1 provos 51:
52: struct pattern {
53: char *match;
54: int flags;
55: char *response;
56: };
57:
58: struct pattern patterns[] = {
59: {
1.6 deraadt 60: "^[0-9]*$",
1.1 provos 61: REG_EXTENDED|REG_NOSUB,
62: "Please don't use all-digit passwords."
63: },
64: {
65: "^[a-z]{1,9}$",
66: REG_EXTENDED|REG_NOSUB,
67: "Please don't use an all-lower case password."
68: },
69: {
70: "^[a-z]{1,6}[0-9]+$",
71: REG_EXTENDED|REG_NOSUB|REG_ICASE,
72: "Please use a more complicated password."
73: },
74: {
75: "^([a-z][0-9]){1,4}$",
76: REG_EXTENDED|REG_NOSUB|REG_ICASE,
77: "Please use a more complicated password."
78: },
79: {
80: "^([0-9][a-z]){1,4}$",
81: REG_EXTENDED|REG_NOSUB|REG_ICASE,
82: "Please use a more complicated password."
83: }
84: };
85:
86: int
1.8 millert 87: pwd_check(login_cap_t *lc, char *password)
1.1 provos 88: {
89: regex_t rgx;
1.4 millert 90: int i, res, min_len;
1.9 millert 91: char *checker;
1.11 djm 92: char *argp[] = { "sh", "-c", NULL, NULL};
1.1 provos 93: int pipefds[2];
1.7 tedu 94: pid_t child;
1.11 djm 95: uid_t uid;
96: gid_t gid;
1.6 deraadt 97:
1.9 millert 98: min_len = (int)login_getcapnum(lc, "minpasswordlen", 6, 6);
1.4 millert 99: if (min_len > 0 && strlen(password) < min_len) {
1.1 provos 100: printf("Please enter a longer password.\n");
101: return (0);
102: }
103:
1.11 djm 104: /* External password check program */
1.9 millert 105: checker = login_getcapstr(lc, "passwordcheck", NULL, NULL);
1.1 provos 106:
1.11 djm 107: /* Pipes are only used for external checker */
108: if (checker != NULL && pipe(pipefds) == -1) {
1.1 provos 109: warn("pipe");
110: goto out;
111: }
112:
1.11 djm 113: /* Check password in low-privileged child */
114: switch (child = fork()) {
115: case -1:
116: warn("fork");
117: goto out;
118: case 0:
119: (void)signal(SIGINT, SIG_DFL);
120: (void)signal(SIGQUIT, SIG_DFL);
121: uid = getuid();
122: gid = getgid();
123: if (setresgid(gid, gid, gid) == -1) {
124: warn("setresgid");
125: exit(1);
126: }
127: if (setgroups(1, &gid) == -1) {
128: warn("setgroups");
129: exit(1);
130: }
131: if (setresuid(uid, uid, uid) == -1) {
132: warn("setresuid");
133: exit(1);
134: }
135:
1.13 ajacouto 136: if (checker == NULL) {
1.14 ! deraadt 137: if (pledge("stdio", NULL) == -1)
! 138: err(1, "pledge");
! 139:
1.13 ajacouto 140: for (i = 0; i < sizeof(patterns) / sizeof(*patterns); i++) {
141: if (regcomp(&rgx, patterns[i].match,
142: patterns[i].flags) != 0)
143: continue;
144: res = regexec(&rgx, password, 0, NULL, 0);
145: regfree(&rgx);
146: if (res == 0) {
147: printf("%s\n", patterns[i].response);
148: exit(1);
149: }
1.11 djm 150: }
1.13 ajacouto 151: /* no external checker in use, accept the password */
152: exit(0);
1.11 djm 153: }
1.14 ! deraadt 154:
! 155: if (pledge("stdio exec", NULL) == -1)
! 156: err(1, "pledge");
1.1 provos 157:
1.11 djm 158: /* Otherwise, pass control to checker program */
159: argp[2] = checker;
160: if (dup2(pipefds[0], STDIN_FILENO) == -1) {
161: warn("dup2");
1.1 provos 162: exit(1);
1.11 djm 163: }
1.1 provos 164: close(pipefds[0]);
165: close(pipefds[1]);
166:
1.11 djm 167: if (execv(_PATH_BSHELL, argp) == -1) {
168: warn("exec");
1.1 provos 169: exit(1);
1.11 djm 170: }
171: /* NOTREACHED */
172: default:
173: break; /* parent continues below */
1.1 provos 174: }
175:
1.11 djm 176: if (checker != NULL) {
177: /* Send the password to STDIN of child */
178: close(pipefds[0]);
179: write(pipefds[1], password, strlen(password) + 1);
180: close(pipefds[1]);
181: }
1.1 provos 182:
183: /* get the return value from the child */
1.7 tedu 184: wait(&child);
1.9 millert 185: if (WIFEXITED(child) && WEXITSTATUS(child) == 0) {
1.11 djm 186: if (checker != NULL)
187: free(checker);
1.1 provos 188: return (1);
1.9 millert 189: }
1.1 provos 190:
191: out:
1.11 djm 192: if (checker != NULL)
193: free(checker);
1.6 deraadt 194: printf("Please use a different password. Unusual capitalization,\n");
195: printf("control characters, or digits are suggested.\n");
1.11 djm 196:
1.1 provos 197: return (0);
198: }
199:
1.6 deraadt 200: int
1.8 millert 201: pwd_gettries(login_cap_t *lc)
1.4 millert 202: {
203: quad_t ntries;
204:
205: if ((ntries = login_getcapnum(lc, "passwordtries", -1, -1)) != -1) {
1.10 moritz 206: if (ntries >= 0 && ntries <= INT_MAX)
1.9 millert 207: return((int)ntries);
208: fprintf(stderr,
209: "Warning: pwdtries out of range in /etc/login.conf");
1.4 millert 210: }
1.1 provos 211:
1.8 millert 212: /*
1.9 millert 213: * If no amount of tries is specified, return a default of 3,
214: * meaning that after 3 attempts where the user is foiled by the
215: * password checks, it will no longer be checked and they can set
216: * it to whatever they like. This is the historic BSD behavior.
1.1 provos 217: */
1.9 millert 218: return (3);
1.1 provos 219: }