version 1.20.2.3, 2002/10/11 14:53:06 |
version 1.21, 2002/01/29 14:32:03 |
|
|
#include "includes.h" |
#include "includes.h" |
RCSID("$OpenBSD$"); |
RCSID("$OpenBSD$"); |
|
|
|
#include "packet.h" |
#include "xmalloc.h" |
#include "xmalloc.h" |
#include "match.h" |
#include "match.h" |
#include "log.h" |
#include "log.h" |
|
|
#include "auth-options.h" |
#include "auth-options.h" |
#include "servconf.h" |
#include "servconf.h" |
#include "misc.h" |
#include "misc.h" |
#include "monitor_wrap.h" |
|
#include "auth.h" |
|
|
|
/* Flags set authorized_keys flags */ |
/* Flags set authorized_keys flags */ |
int no_port_forwarding_flag = 0; |
int no_port_forwarding_flag = 0; |
|
|
forced_command = NULL; |
forced_command = NULL; |
} |
} |
channel_clear_permitted_opens(); |
channel_clear_permitted_opens(); |
auth_debug_reset(); |
|
} |
} |
|
|
/* |
/* |
|
|
while (*opts && *opts != ' ' && *opts != '\t') { |
while (*opts && *opts != ' ' && *opts != '\t') { |
cp = "no-port-forwarding"; |
cp = "no-port-forwarding"; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
auth_debug_add("Port forwarding disabled."); |
packet_send_debug("Port forwarding disabled."); |
no_port_forwarding_flag = 1; |
no_port_forwarding_flag = 1; |
opts += strlen(cp); |
opts += strlen(cp); |
goto next_option; |
goto next_option; |
} |
} |
cp = "no-agent-forwarding"; |
cp = "no-agent-forwarding"; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
auth_debug_add("Agent forwarding disabled."); |
packet_send_debug("Agent forwarding disabled."); |
no_agent_forwarding_flag = 1; |
no_agent_forwarding_flag = 1; |
opts += strlen(cp); |
opts += strlen(cp); |
goto next_option; |
goto next_option; |
} |
} |
cp = "no-X11-forwarding"; |
cp = "no-X11-forwarding"; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
auth_debug_add("X11 forwarding disabled."); |
packet_send_debug("X11 forwarding disabled."); |
no_x11_forwarding_flag = 1; |
no_x11_forwarding_flag = 1; |
opts += strlen(cp); |
opts += strlen(cp); |
goto next_option; |
goto next_option; |
} |
} |
cp = "no-pty"; |
cp = "no-pty"; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
auth_debug_add("Pty allocation disabled."); |
packet_send_debug("Pty allocation disabled."); |
no_pty_flag = 1; |
no_pty_flag = 1; |
opts += strlen(cp); |
opts += strlen(cp); |
goto next_option; |
goto next_option; |
|
|
if (!*opts) { |
if (!*opts) { |
debug("%.100s, line %lu: missing end quote", |
debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
auth_debug_add("%.100s, line %lu: missing end quote", |
packet_send_debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
xfree(forced_command); |
xfree(forced_command); |
forced_command = NULL; |
forced_command = NULL; |
goto bad_option; |
goto bad_option; |
} |
} |
forced_command[i] = 0; |
forced_command[i] = 0; |
auth_debug_add("Forced command: %.900s", forced_command); |
packet_send_debug("Forced command: %.900s", forced_command); |
opts++; |
opts++; |
goto next_option; |
goto next_option; |
} |
} |
cp = "environment=\""; |
cp = "environment=\""; |
if (options.permit_user_env && |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
strncasecmp(opts, cp, strlen(cp)) == 0) { |
|
char *s; |
char *s; |
struct envstring *new_envstring; |
struct envstring *new_envstring; |
|
|
|
|
if (!*opts) { |
if (!*opts) { |
debug("%.100s, line %lu: missing end quote", |
debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
auth_debug_add("%.100s, line %lu: missing end quote", |
packet_send_debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
xfree(s); |
xfree(s); |
goto bad_option; |
goto bad_option; |
} |
} |
s[i] = 0; |
s[i] = 0; |
auth_debug_add("Adding to environment: %.900s", s); |
packet_send_debug("Adding to environment: %.900s", s); |
debug("Adding to environment: %.900s", s); |
debug("Adding to environment: %.900s", s); |
opts++; |
opts++; |
new_envstring = xmalloc(sizeof(struct envstring)); |
new_envstring = xmalloc(sizeof(struct envstring)); |
|
|
if (!*opts) { |
if (!*opts) { |
debug("%.100s, line %lu: missing end quote", |
debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
auth_debug_add("%.100s, line %lu: missing end quote", |
packet_send_debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
xfree(patterns); |
xfree(patterns); |
goto bad_option; |
goto bad_option; |
|
|
"correct key but not from a permitted " |
"correct key but not from a permitted " |
"host (host=%.200s, ip=%.200s).", |
"host (host=%.200s, ip=%.200s).", |
pw->pw_name, remote_host, remote_ip); |
pw->pw_name, remote_host, remote_ip); |
auth_debug_add("Your host '%.200s' is not " |
packet_send_debug("Your host '%.200s' is not " |
"permitted to use this key for login.", |
"permitted to use this key for login.", |
remote_host); |
remote_host); |
/* deny access */ |
/* deny access */ |
|
|
if (!*opts) { |
if (!*opts) { |
debug("%.100s, line %lu: missing end quote", |
debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
auth_debug_add("%.100s, line %lu: missing end quote", |
packet_send_debug("%.100s, line %lu: missing end quote", |
file, linenum); |
file, linenum); |
xfree(patterns); |
xfree(patterns); |
goto bad_option; |
goto bad_option; |
|
|
sscanf(patterns, "%255[^/]/%5[0-9]", host, sport) != 2) { |
sscanf(patterns, "%255[^/]/%5[0-9]", host, sport) != 2) { |
debug("%.100s, line %lu: Bad permitopen specification " |
debug("%.100s, line %lu: Bad permitopen specification " |
"<%.100s>", file, linenum, patterns); |
"<%.100s>", file, linenum, patterns); |
auth_debug_add("%.100s, line %lu: " |
packet_send_debug("%.100s, line %lu: " |
"Bad permitopen specification", file, linenum); |
"Bad permitopen specification", file, linenum); |
xfree(patterns); |
xfree(patterns); |
goto bad_option; |
goto bad_option; |
|
|
if ((port = a2port(sport)) == 0) { |
if ((port = a2port(sport)) == 0) { |
debug("%.100s, line %lu: Bad permitopen port <%.100s>", |
debug("%.100s, line %lu: Bad permitopen port <%.100s>", |
file, linenum, sport); |
file, linenum, sport); |
auth_debug_add("%.100s, line %lu: " |
packet_send_debug("%.100s, line %lu: " |
"Bad permitopen port", file, linenum); |
"Bad permitopen port", file, linenum); |
xfree(patterns); |
xfree(patterns); |
goto bad_option; |
goto bad_option; |
|
|
opts++; |
opts++; |
/* Process the next option. */ |
/* Process the next option. */ |
} |
} |
|
|
if (!use_privsep) |
|
auth_debug_send(); |
|
|
|
/* grant access */ |
/* grant access */ |
return 1; |
return 1; |
|
|
bad_option: |
bad_option: |
log("Bad options in %.100s file, line %lu: %.50s", |
log("Bad options in %.100s file, line %lu: %.50s", |
file, linenum, opts); |
file, linenum, opts); |
auth_debug_add("Bad options in %.100s file, line %lu: %.50s", |
packet_send_debug("Bad options in %.100s file, line %lu: %.50s", |
file, linenum, opts); |
file, linenum, opts); |
|
|
if (!use_privsep) |
|
auth_debug_send(); |
|
|
|
/* deny access */ |
/* deny access */ |
return 0; |
return 0; |
} |
} |