1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21 /*
22 * Copyright 2006 Sun Microsystems, Inc. All rights reserved.
23 * Use is subject to license terms.
24 */
25
26 #include <crypt.h>
27 #include <pwd.h>
28 #include <shadow.h>
29 #include <string.h>
30 #include <stdlib.h>
31 #include <syslog.h>
32 #include <security/pam_appl.h>
33 #include <security/pam_modules.h>
34 #include "../../libpam/pam_impl.h"
35
36 #include <libintl.h>
37
38 /*
39 * Various useful files and string constants
40 */
41 #define DIAL_FILE "/etc/dialups"
42 #define DPASS_FILE "/etc/d_passwd"
43 #define SHELL "/usr/bin/sh"
44 #define SCPYN(a, b) (void) strncpy(a, b, sizeof (a))
45
46 /*
47 * pam_sm_authenticate - This is the top level function in the
48 * module called by pam_auth_port in the framework
49 * Returns: PAM_AUTH_ERR on failure, 0 on success
50 */
51 /*ARGSUSED*/
52 int
pam_sm_authenticate(pam_handle_t * pamh,int flags,int argc,const char ** argv)53 pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv)
54 {
55 char *ttyn, *user;
56 FILE *fp;
57 char defpass[30];
58 char line[80];
59 char *p1 = NULL, *p2 = NULL;
60 struct passwd pwd;
61 char pwd_buffer[1024];
62 char *password = NULL;
63 int retcode;
64 int i;
65 int debug = 0;
66 int res;
67
68 for (i = 0; i < argc; i++) {
69 if (strcasecmp(argv[i], "debug") == 0)
70 debug = 1;
71 else
72 syslog(LOG_DEBUG, "illegal option %s", argv[i]);
73 }
74
75 if ((retcode = pam_get_user(pamh, &user, NULL))
76 != PAM_SUCCESS ||
77 (retcode = pam_get_item(pamh, PAM_TTY, (void **)&ttyn))
78 != PAM_SUCCESS)
79 return (retcode);
80
81 if (debug) {
82 syslog(LOG_DEBUG,
83 "Dialpass authenticate user = %s, ttyn = %s",
84 user ? user : "NULL", ttyn ? ttyn : "NULL");
85 }
86
87 if (ttyn == NULL || *ttyn == '\0') {
88 char *service;
89
90 (void) pam_get_item(pamh, PAM_SERVICE, (void **)&service);
91 syslog(LOG_ERR, "pam_dial_auth: terminal-device not specified"
92 "by %s, returning %s.", service,
93 pam_strerror(pamh, PAM_SERVICE_ERR));
94 return (PAM_SERVICE_ERR);
95 }
96 if (getpwnam_r(user, &pwd, pwd_buffer, sizeof (pwd_buffer)) == NULL)
97 return (PAM_USER_UNKNOWN);
98
99 if ((fp = fopen(DIAL_FILE, "rF")) == NULL)
100 return (PAM_IGNORE);
101
102 while ((p1 = fgets(line, sizeof (line), fp)) != NULL) {
103 while (*p1 != '\n' && *p1 != ' ' && *p1 != '\t')
104 p1++;
105 *p1 = '\0';
106 if (strcmp(line, ttyn) == 0)
107 break;
108 }
109
110 (void) fclose(fp);
111
112 if ((fp = fopen(DPASS_FILE, "rF")) == NULL) {
113 syslog(LOG_ERR, "pam_dial_auth: %s without %s, returning %s.",
114 DIAL_FILE, DPASS_FILE,
115 pam_strerror(pamh, PAM_SYSTEM_ERR));
116 (void) memset(line, 0, sizeof (line));
117 return (PAM_SYSTEM_ERR);
118 }
119
120 if (p1 == NULL) {
121 (void) fclose(fp);
122 (void) memset(line, 0, sizeof (line));
123 return (PAM_IGNORE);
124 }
125
126 defpass[0] = '\0';
127
128 while ((p1 = fgets(line, sizeof (line)-1, fp)) != NULL) {
129 while (*p1 && *p1 != ':')
130 p1++;
131 *p1++ = '\0';
132 p2 = p1;
133 while (*p1 && *p1 != ':')
134 p1++;
135 *p1 = '\0';
136 if (pwd.pw_shell != NULL && strcmp(pwd.pw_shell, line) == 0)
137 break;
138
139 if (strcmp(SHELL, line) == 0)
140 SCPYN(defpass, p2);
141 p2 = NULL;
142 }
143
144 (void) memset(line, 0, sizeof (line));
145 (void) fclose(fp);
146
147 if (p2 == NULL)
148 p2 = defpass;
149
150 if (*p2 != '\0') {
151 res = __pam_get_authtok(pamh, PAM_PROMPT, PAM_AUTHTOK,
152 dgettext(TEXT_DOMAIN, "Dialup Password: "), &password);
153
154 if (res != PAM_SUCCESS) {
155 return (res);
156 }
157
158 if (strcmp(crypt(password, p2), p2) != 0) {
159 (void) memset(password, 0, strlen(password));
160 free(password);
161 return (PAM_AUTH_ERR);
162 }
163 (void) memset(password, 0, strlen(password));
164 free(password);
165 }
166
167 return (PAM_SUCCESS);
168 }
169
170 /*
171 * dummy pam_sm_setcred - does nothing
172 */
173 /*ARGSUSED*/
174 int
pam_sm_setcred(pam_handle_t * pamh,int flags,int argc,const char ** argv)175 pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv)
176 {
177 return (PAM_IGNORE);
178 }
179