pam_unix_sess.c 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. /*
  2. * pam_unix session management
  3. *
  4. * Copyright Alexander O. Yuriev, 1996. All rights reserved.
  5. * Copyright Jan Rękorajski, 1999. All rights reserved.
  6. *
  7. * Redistribution and use in source and binary forms, with or without
  8. * modification, are permitted provided that the following conditions
  9. * are met:
  10. * 1. Redistributions of source code must retain the above copyright
  11. * notice, and the entire permission notice in its entirety,
  12. * including the disclaimer of warranties.
  13. * 2. Redistributions in binary form must reproduce the above copyright
  14. * notice, this list of conditions and the following disclaimer in the
  15. * documentation and/or other materials provided with the distribution.
  16. * 3. The name of the author may not be used to endorse or promote
  17. * products derived from this software without specific prior
  18. * written permission.
  19. *
  20. * ALTERNATIVELY, this product may be distributed under the terms of
  21. * the GNU Public License, in which case the provisions of the GPL are
  22. * required INSTEAD OF the above restrictions. (This clause is
  23. * necessary due to a potential bad interaction between the GPL and
  24. * the restrictions contained in a BSD-style copyright.)
  25. *
  26. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
  27. * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
  28. * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  29. * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
  30. * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
  31. * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
  32. * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  33. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  34. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  35. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  36. * OF THE POSSIBILITY OF SUCH DAMAGE.
  37. */
  38. #include "config.h"
  39. #include <stdio.h>
  40. #include <stdlib.h>
  41. #include <stdarg.h>
  42. #include <unistd.h>
  43. #include <syslog.h>
  44. #include <fcntl.h>
  45. #include <sys/types.h>
  46. #include <sys/stat.h>
  47. #include <security/_pam_macros.h>
  48. #include <security/pam_modules.h>
  49. #include <security/pam_ext.h>
  50. #include <security/pam_modutil.h>
  51. #include "support.h"
  52. /*
  53. * PAM framework looks for these entry-points to pass control to the
  54. * session module.
  55. */
  56. int
  57. pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, const char **argv)
  58. {
  59. char *user_name, *service;
  60. unsigned long long ctrl;
  61. int retval;
  62. const char *login_name;
  63. D(("called."));
  64. ctrl = _set_ctrl(pamh, flags, NULL, NULL, NULL, argc, argv);
  65. retval = pam_get_item(pamh, PAM_USER, (void *) &user_name);
  66. if (user_name == NULL || *user_name == '\0' || retval != PAM_SUCCESS) {
  67. pam_syslog(pamh, LOG_ERR,
  68. "open_session - error recovering username");
  69. return PAM_SESSION_ERR; /* How did we get authenticated with
  70. no username?! */
  71. }
  72. retval = pam_get_item(pamh, PAM_SERVICE, (void *) &service);
  73. if (service == NULL || *service == '\0' || retval != PAM_SUCCESS) {
  74. pam_syslog(pamh, LOG_CRIT,
  75. "open_session - error recovering service");
  76. return PAM_SESSION_ERR;
  77. }
  78. login_name = pam_modutil_getlogin(pamh);
  79. if (login_name == NULL) {
  80. login_name = "";
  81. }
  82. if (off (UNIX_QUIET, ctrl)) {
  83. char uid[32];
  84. struct passwd *pwd = pam_modutil_getpwnam (pamh, user_name);
  85. if (pwd == NULL) {
  86. snprintf (uid, 32, "getpwnam error");
  87. }
  88. else {
  89. snprintf (uid, 32, "%u", pwd->pw_uid);
  90. }
  91. pam_syslog(pamh, LOG_INFO, "session opened for user %s(uid=%s) by %s(uid=%lu)", user_name, uid, login_name, (unsigned long)getuid());
  92. }
  93. return PAM_SUCCESS;
  94. }
  95. int
  96. pam_sm_close_session(pam_handle_t *pamh, int flags, int argc, const char **argv)
  97. {
  98. char *user_name, *service;
  99. unsigned long long ctrl;
  100. int retval;
  101. D(("called."));
  102. ctrl = _set_ctrl(pamh, flags, NULL, NULL, NULL, argc, argv);
  103. retval = pam_get_item(pamh, PAM_USER, (void *) &user_name);
  104. if (user_name == NULL || *user_name == '\0' || retval != PAM_SUCCESS) {
  105. pam_syslog(pamh, LOG_ERR,
  106. "close_session - error recovering username");
  107. return PAM_SESSION_ERR; /* How did we get authenticated with
  108. no username?! */
  109. }
  110. retval = pam_get_item(pamh, PAM_SERVICE, (void *) &service);
  111. if (service == NULL || *service == '\0' || retval != PAM_SUCCESS) {
  112. pam_syslog(pamh, LOG_CRIT,
  113. "close_session - error recovering service");
  114. return PAM_SESSION_ERR;
  115. }
  116. if (off (UNIX_QUIET, ctrl))
  117. pam_syslog(pamh, LOG_INFO, "session closed for user %s",
  118. user_name);
  119. return PAM_SUCCESS;
  120. }