[BACK]Return to auth-passwd.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/auth-passwd.c, Revision 1.29.2.1

1.1       deraadt     1: /*
1.11      deraadt     2:  * Author: Tatu Ylonen <ylo@cs.hut.fi>
                      3:  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
                      4:  *                    All rights reserved
                      5:  * Password authentication.  This file contains the functions to check whether
                      6:  * the password is valid for the user.
1.17      deraadt     7:  *
                      8:  * As far as I am concerned, the code I have written for this software
                      9:  * can be used freely for any purpose.  Any derived versions of this
                     10:  * software must be clearly marked as such, and if the derived work is
                     11:  * incompatible with the protocol description in the RFC file, it must be
                     12:  * called by a name other than "ssh" or "Secure Shell".
                     13:  *
                     14:  * Copyright (c) 1999 Dug Song.  All rights reserved.
                     15:  * Copyright (c) 2000 Markus Friedl.  All rights reserved.
                     16:  *
                     17:  * Redistribution and use in source and binary forms, with or without
                     18:  * modification, are permitted provided that the following conditions
                     19:  * are met:
                     20:  * 1. Redistributions of source code must retain the above copyright
                     21:  *    notice, this list of conditions and the following disclaimer.
                     22:  * 2. Redistributions in binary form must reproduce the above copyright
                     23:  *    notice, this list of conditions and the following disclaimer in the
                     24:  *    documentation and/or other materials provided with the distribution.
                     25:  *
                     26:  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
                     27:  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
                     28:  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
                     29:  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
                     30:  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
                     31:  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
                     32:  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
                     33:  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
                     34:  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
                     35:  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1.11      deraadt    36:  */
1.1       deraadt    37:
                     38: #include "includes.h"
1.29.2.1! brad       39: RCSID("$OpenBSD: auth-passwd.c,v 1.31 2004/01/30 09:48:57 markus Exp $");
1.1       deraadt    40:
                     41: #include "packet.h"
1.20      markus     42: #include "log.h"
1.1       deraadt    43: #include "servconf.h"
1.19      markus     44: #include "auth.h"
1.29.2.1! brad       45: #include "auth-options.h"
1.22      markus     46:
                     47: extern ServerOptions options;
1.29.2.1! brad       48: int sys_auth_passwd(Authctxt *, const char *);
        !            49:
        !            50: static void
        !            51: disable_forwarding(void)
        !            52: {
        !            53:        no_port_forwarding_flag = 1;
        !            54:        no_agent_forwarding_flag = 1;
        !            55:        no_x11_forwarding_flag = 1;
        !            56: }
1.22      markus     57:
1.11      deraadt    58: /*
                     59:  * Tries to authenticate the user using password.  Returns true if
                     60:  * authentication succeeds.
                     61:  */
1.15      markus     62: int
1.22      markus     63: auth_password(Authctxt *authctxt, const char *password)
1.1       deraadt    64: {
1.22      markus     65:        struct passwd * pw = authctxt->pw;
1.29      markus     66:        int ok = authctxt->valid;
1.7       markus     67:
1.21      markus     68:        if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES)
1.29      markus     69:                ok = 0;
1.26      mouring    70:        if (*password == '\0' && options.permit_empty_passwd == 0)
1.10      markus     71:                return 0;
1.23      dugsong    72: #ifdef KRB5
                     73:        if (options.kerberos_authentication == 1) {
                     74:                int ret = auth_krb5_password(authctxt, password);
1.13      markus     75:                if (ret == 1 || ret == 0)
1.29      markus     76:                        return ret && ok;
1.10      markus     77:                /* Fall back to ordinary passwd authentication. */
1.2       dugsong    78:        }
1.13      markus     79: #endif
1.29.2.1! brad       80:        return (sys_auth_passwd(authctxt, password) && ok);
        !            81: }
        !            82:
1.23      dugsong    83: #ifdef BSD_AUTH
1.29.2.1! brad       84: int
        !            85: sys_auth_passwd(Authctxt *authctxt, const char *password)
        !            86: {
        !            87:        struct passwd *pw = authctxt->pw;
        !            88:        auth_session_t *as;
        !            89:
        !            90:        as = auth_usercheck(pw->pw_name, authctxt->style, "auth-ssh",
        !            91:            (char *)password);
        !            92:        if (auth_getstate(as) & AUTH_PWEXPIRED) {
        !            93:                auth_close(as);
        !            94:                disable_forwarding();
        !            95:                authctxt->force_pwchange = 1;
        !            96:                return (1);
        !            97:        } else {
        !            98:                return (auth_close(as));
        !            99:        }
        !           100: }
1.27      stevesk   101: #else
1.29.2.1! brad      102: int
        !           103: sys_auth_passwd(Authctxt *authctxt, const char *password)
        !           104: {
        !           105:        struct passwd *pw = authctxt->pw;
        !           106:        char *encrypted_password;
        !           107:
1.10      markus    108:        /* Check for users with no password. */
1.12      markus    109:        if (strcmp(password, "") == 0 && strcmp(pw->pw_passwd, "") == 0)
1.29.2.1! brad      110:                return (1);
        !           111:
        !           112:        /* Encrypt the candidate password using the proper salt. */
        !           113:        encrypted_password = crypt(password,
        !           114:            (pw->pw_passwd[0] && pw->pw_passwd[1]) ?
        !           115:            pw->pw_passwd : "xx");
        !           116:
        !           117:        /*
        !           118:         * Authentication is accepted if the encrypted passwords
        !           119:         * are identical.
        !           120:         */
        !           121:        return (strcmp(encrypted_password, pw->pw_passwd) == 0);
1.1       deraadt   122: }
1.29.2.1! brad      123: #endif