pam_issue.c 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306
  1. /*
  2. * pam_issue module - a simple /etc/issue parser to set PAM_USER_PROMPT
  3. *
  4. * Copyright 1999 by Ben Collins <bcollins@debian.org>
  5. *
  6. * Needs to be called before any other auth modules so we can setup the
  7. * user prompt before it's first used. Allows one argument option, which
  8. * is the full path to a file to be used for issue (uses /etc/issue as a
  9. * default) such as "issue=/etc/issue.telnet".
  10. *
  11. * We can also parse escapes within the the issue file (enabled by
  12. * default, but can be disabled with the "noesc" option). It's the exact
  13. * same parsing as util-linux's agetty program performs.
  14. *
  15. * Released under the GNU LGPL version 2 or later
  16. */
  17. #include "config.h"
  18. #include <string.h>
  19. #include <stdio.h>
  20. #include <stdlib.h>
  21. #include <sys/types.h>
  22. #include <sys/stat.h>
  23. #include <fcntl.h>
  24. #include <unistd.h>
  25. #include <sys/utsname.h>
  26. #include <utmp.h>
  27. #include <time.h>
  28. #include <syslog.h>
  29. #include <security/_pam_macros.h>
  30. #include <security/pam_modules.h>
  31. #include <security/pam_ext.h>
  32. #include "pam_inline.h"
  33. static int _user_prompt_set = 0;
  34. static int read_issue_raw(pam_handle_t *pamh, FILE *fp, char **prompt);
  35. static int read_issue_quoted(pam_handle_t *pamh, FILE *fp, char **prompt);
  36. /* --- authentication management functions (only) --- */
  37. int
  38. pam_sm_authenticate (pam_handle_t *pamh, int flags UNUSED,
  39. int argc, const char **argv)
  40. {
  41. int retval = PAM_SERVICE_ERR;
  42. FILE *fp;
  43. const char *issue_file = NULL;
  44. int parse_esc = 1;
  45. const void *item = NULL;
  46. const char *cur_prompt;
  47. char *issue_prompt = NULL;
  48. /* If we've already set the prompt, don't set it again */
  49. if(_user_prompt_set)
  50. return PAM_IGNORE;
  51. /* We set this here so if we fail below, we won't get further
  52. than this next time around (only one real failure) */
  53. _user_prompt_set = 1;
  54. for ( ; argc-- > 0 ; ++argv ) {
  55. const char *str;
  56. if ((str = pam_str_skip_prefix(*argv, "issue=")) != NULL) {
  57. issue_file = str;
  58. D(("set issue_file to: %s", issue_file));
  59. } else if (!strcmp(*argv,"noesc")) {
  60. parse_esc = 0;
  61. D(("turning off escape parsing by request"));
  62. } else
  63. D(("unknown option passed: %s", *argv));
  64. }
  65. if (issue_file == NULL)
  66. issue_file = "/etc/issue";
  67. if ((fp = fopen(issue_file, "r")) == NULL) {
  68. pam_syslog(pamh, LOG_ERR, "error opening %s: %m", issue_file);
  69. return PAM_SERVICE_ERR;
  70. }
  71. if ((retval = pam_get_item(pamh, PAM_USER_PROMPT, &item)) != PAM_SUCCESS) {
  72. fclose(fp);
  73. return retval;
  74. }
  75. cur_prompt = item;
  76. if (cur_prompt == NULL)
  77. cur_prompt = "";
  78. if (parse_esc)
  79. retval = read_issue_quoted(pamh, fp, &issue_prompt);
  80. else
  81. retval = read_issue_raw(pamh, fp, &issue_prompt);
  82. fclose(fp);
  83. if (retval != PAM_SUCCESS)
  84. goto out;
  85. {
  86. size_t size = strlen(issue_prompt) + strlen(cur_prompt) + 1;
  87. char *new_prompt = realloc(issue_prompt, size);
  88. if (new_prompt == NULL) {
  89. pam_syslog(pamh, LOG_CRIT, "out of memory");
  90. retval = PAM_BUF_ERR;
  91. goto out;
  92. }
  93. issue_prompt = new_prompt;
  94. }
  95. strcat(issue_prompt, cur_prompt);
  96. retval = pam_set_item(pamh, PAM_USER_PROMPT,
  97. (const void *) issue_prompt);
  98. out:
  99. _pam_drop(issue_prompt);
  100. return (retval == PAM_SUCCESS) ? PAM_IGNORE : retval;
  101. }
  102. int
  103. pam_sm_setcred (pam_handle_t *pamh UNUSED, int flags UNUSED,
  104. int argc UNUSED, const char **argv UNUSED)
  105. {
  106. return PAM_IGNORE;
  107. }
  108. static int
  109. read_issue_raw(pam_handle_t *pamh, FILE *fp, char **prompt)
  110. {
  111. char *issue;
  112. struct stat st;
  113. *prompt = NULL;
  114. if (fstat(fileno(fp), &st) < 0) {
  115. pam_syslog(pamh, LOG_ERR, "stat error: %m");
  116. return PAM_SERVICE_ERR;
  117. }
  118. if ((issue = malloc(st.st_size + 1)) == NULL) {
  119. pam_syslog(pamh, LOG_CRIT, "out of memory");
  120. return PAM_BUF_ERR;
  121. }
  122. if ((off_t)fread(issue, 1, st.st_size, fp) != st.st_size) {
  123. pam_syslog(pamh, LOG_ERR, "read error: %m");
  124. _pam_drop(issue);
  125. return PAM_SERVICE_ERR;
  126. }
  127. issue[st.st_size] = '\0';
  128. *prompt = issue;
  129. return PAM_SUCCESS;
  130. }
  131. static int
  132. read_issue_quoted(pam_handle_t *pamh, FILE *fp, char **prompt)
  133. {
  134. int c;
  135. size_t size = 1024;
  136. size_t issue_len = 0;
  137. char *issue;
  138. struct utsname uts;
  139. *prompt = NULL;
  140. if ((issue = malloc(size)) == NULL) {
  141. pam_syslog(pamh, LOG_CRIT, "out of memory");
  142. return PAM_BUF_ERR;
  143. }
  144. (void) uname(&uts);
  145. while ((c = getc(fp)) != EOF) {
  146. const char *src = NULL;
  147. size_t len = 0;
  148. char buf[1024] = "";
  149. if (c == '\\') {
  150. if ((c = getc(fp)) == EOF)
  151. break;
  152. switch (c) {
  153. case 's':
  154. src = uts.sysname;
  155. len = strnlen(uts.sysname, sizeof(uts.sysname));
  156. break;
  157. case 'n':
  158. src = uts.nodename;
  159. len = strnlen(uts.nodename, sizeof(uts.nodename));
  160. break;
  161. case 'r':
  162. src = uts.release;
  163. len = strnlen(uts.release, sizeof(uts.release));
  164. break;
  165. case 'v':
  166. src = uts.version;
  167. len = strnlen(uts.version, sizeof(uts.version));
  168. break;
  169. case 'm':
  170. src = uts.machine;
  171. len = strnlen(uts.machine, sizeof(uts.machine));
  172. break;
  173. case 'o':
  174. #ifdef HAVE_GETDOMAINNAME
  175. if (getdomainname(buf, sizeof(buf)) >= 0)
  176. buf[sizeof(buf) - 1] = '\0';
  177. #endif
  178. break;
  179. case 'd':
  180. case 't':
  181. {
  182. const char *weekday[] = {
  183. "Sun", "Mon", "Tue", "Wed", "Thu",
  184. "Fri", "Sat" };
  185. const char *month[] = {
  186. "Jan", "Feb", "Mar", "Apr", "May",
  187. "Jun", "Jul", "Aug", "Sep", "Oct",
  188. "Nov", "Dec" };
  189. time_t now;
  190. struct tm *tm;
  191. (void) time (&now);
  192. tm = localtime(&now);
  193. if (c == 'd')
  194. snprintf (buf, sizeof buf, "%s %s %d %d",
  195. weekday[tm->tm_wday], month[tm->tm_mon],
  196. tm->tm_mday, tm->tm_year + 1900);
  197. else
  198. snprintf (buf, sizeof buf, "%02d:%02d:%02d",
  199. tm->tm_hour, tm->tm_min, tm->tm_sec);
  200. }
  201. break;
  202. case 'l':
  203. {
  204. const char *ttyn = ttyname(1);
  205. if (ttyn) {
  206. const char *str = pam_str_skip_prefix(ttyn, "/dev/");
  207. if (str != NULL)
  208. ttyn = str;
  209. src = ttyn;
  210. len = strlen(ttyn);
  211. }
  212. }
  213. break;
  214. case 'u':
  215. case 'U':
  216. {
  217. unsigned int users = 0;
  218. struct utmp *ut;
  219. setutent();
  220. while ((ut = getutent())) {
  221. if (ut->ut_type == USER_PROCESS)
  222. ++users;
  223. }
  224. endutent();
  225. if (c == 'U')
  226. snprintf (buf, sizeof buf, "%u %s", users,
  227. (users == 1) ? "user" : "users");
  228. else
  229. snprintf (buf, sizeof buf, "%u", users);
  230. break;
  231. }
  232. default:
  233. buf[0] = c; buf[1] = '\0';
  234. }
  235. } else {
  236. buf[0] = c; buf[1] = '\0';
  237. }
  238. if (src == NULL) {
  239. src = buf;
  240. len = strlen(buf);
  241. }
  242. if (issue_len + len + 1 > size) {
  243. char *new_issue;
  244. size += len + 1;
  245. new_issue = realloc (issue, size);
  246. if (new_issue == NULL) {
  247. _pam_drop(issue);
  248. return PAM_BUF_ERR;
  249. }
  250. issue = new_issue;
  251. }
  252. memcpy(issue + issue_len, src, len);
  253. issue_len += len;
  254. }
  255. issue[issue_len] = '\0';
  256. if (ferror(fp)) {
  257. pam_syslog(pamh, LOG_ERR, "read error: %m");
  258. _pam_drop(issue);
  259. return PAM_SERVICE_ERR;
  260. }
  261. *prompt = issue;
  262. return PAM_SUCCESS;
  263. }
  264. /* end of module definition */