NetBSD/usr.bin/login/login.c

775 lines
18 KiB
C
Raw Normal View History

1998-07-27 01:58:46 +04:00
/* $NetBSD: login.c,v 1.39 1998/07/26 22:04:37 mycroft Exp $ */
1993-03-21 12:45:37 +03:00
/*-
* Copyright (c) 1980, 1987, 1988, 1991, 1993, 1994
* The Regents of the University of California. All rights reserved.
1993-03-21 12:45:37 +03:00
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include <sys/cdefs.h>
1993-03-21 12:45:37 +03:00
#ifndef lint
__COPYRIGHT(
"@(#) Copyright (c) 1980, 1987, 1988, 1991, 1993, 1994\n\
The Regents of the University of California. All rights reserved.\n");
1993-03-21 12:45:37 +03:00
#endif /* not lint */
#ifndef lint
#if 0
static char sccsid[] = "@(#)login.c 8.4 (Berkeley) 4/2/94";
#endif
1998-07-27 01:58:46 +04:00
__RCSID("$NetBSD: login.c,v 1.39 1998/07/26 22:04:37 mycroft Exp $");
1993-03-21 12:45:37 +03:00
#endif /* not lint */
/*
* login [ name ]
* login -h hostname (for telnetd, etc.)
* login -f name (for pre-authenticated login: datakit, xterm, etc.)
*/
#include <sys/param.h>
#include <sys/stat.h>
#include <sys/time.h>
#include <sys/resource.h>
#include <sys/file.h>
#include <sys/wait.h>
1993-03-21 12:45:37 +03:00
#include <err.h>
1993-04-27 03:13:43 +04:00
#include <errno.h>
1993-03-21 12:45:37 +03:00
#include <grp.h>
#include <pwd.h>
#include <setjmp.h>
#include <signal.h>
1993-03-21 12:45:37 +03:00
#include <stdio.h>
1993-04-27 03:13:43 +04:00
#include <stdlib.h>
1993-03-21 12:45:37 +03:00
#include <string.h>
#include <syslog.h>
#include <time.h>
#include <ttyent.h>
#include <tzfile.h>
#include <unistd.h>
#include <utmp.h>
#include <util.h>
#ifdef SKEY
#include <skey.h>
#endif
#ifdef KERBEROS5
#include <krb5.h>
#endif
1993-03-21 12:45:37 +03:00
#include "pathnames.h"
1993-04-27 03:13:43 +04:00
void badlogin __P((char *));
void checknologin __P((void));
void dolastlog __P((int));
void getloginname __P((void));
int main __P((int, char *[]));
1993-04-27 03:13:43 +04:00
void motd __P((void));
int rootterm __P((char *));
void sigint __P((int));
void sleepexit __P((int));
1998-07-27 01:58:46 +04:00
const char *stypeof __P((const char *));
1993-04-27 03:13:43 +04:00
void timedout __P((int));
#if defined(KERBEROS) || defined(KERBEROS5)
1993-04-27 03:13:43 +04:00
int klogin __P((struct passwd *, char *, char *, char *));
void kdestroy __P((void));
void dofork __P((void));
1993-04-27 03:13:43 +04:00
#endif
extern void login __P((struct utmp *));
1993-03-21 12:45:37 +03:00
#define TTYGRPNAME "tty" /* name of group to own ttys */
/*
* This bounds the time given to login. Not a define so it can
* be patched on machines where it's too small.
*/
u_int timeout = 300;
1993-04-27 03:13:43 +04:00
#if defined(KERBEROS) || defined(KERBEROS5)
1993-03-21 12:45:37 +03:00
int notickets = 1;
char *instance;
char *krbtkfile_env;
1993-03-21 12:45:37 +03:00
#endif
#ifdef KERBEROS5
extern krb5_context kcontext;
#endif
1993-03-21 12:45:37 +03:00
struct passwd *pwd;
int failures;
char term[64], *envinit[1], *hostname, *username, *tty;
1998-01-07 03:41:43 +03:00
static const char copyrightstr[] = "\
Copyright (c) 1996, 1997, 1998
\tThe NetBSD Foundation, Inc. All rights reserved.
Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994
\tThe Regents of the University of California. All rights reserved.\n\n";
1993-04-27 03:13:43 +04:00
int
1993-03-21 12:45:37 +03:00
main(argc, argv)
int argc;
1993-04-27 03:13:43 +04:00
char *argv[];
1993-03-21 12:45:37 +03:00
{
1993-04-27 03:13:43 +04:00
extern char **environ;
struct group *gr;
struct stat st;
struct timeval tp;
struct utmp utmp;
int ask, ch, cnt, fflag, hflag, pflag, sflag, quietlog, rootlogin, rval;
uid_t uid, saved_uid;
gid_t saved_gid, saved_gids[NGROUPS_MAX];
int nsaved_gids;
1998-07-27 01:58:46 +04:00
char *domain, *p, *ttyn, *pwprompt;
const char *salt;
1993-03-21 12:45:37 +03:00
char tbuf[MAXPATHLEN + 2], tname[sizeof(_PATH_TTY) + 10];
char localhost[MAXHOSTNAMELEN + 1];
int need_chpass, require_chpass;
#ifdef KERBEROS5
krb5_error_code kerror;
#endif
1993-03-21 12:45:37 +03:00
tbuf[0] = '\0';
rval = 0;
pwprompt = NULL;
need_chpass = require_chpass = 0;
1993-03-21 12:45:37 +03:00
(void)signal(SIGALRM, timedout);
(void)alarm(timeout);
1993-03-21 12:45:37 +03:00
(void)signal(SIGQUIT, SIG_IGN);
(void)signal(SIGINT, SIG_IGN);
(void)setpriority(PRIO_PROCESS, 0, 0);
openlog("login", LOG_ODELAY, LOG_AUTH);
/*
* -p is used by getty to tell login not to destroy the environment
1993-04-27 03:13:43 +04:00
* -f is used to skip a second login authentication
1993-03-21 12:45:37 +03:00
* -h is used by other servers to pass the name of the remote
* host to login so that it may be placed in utmp and wtmp
* -s is used to force use of S/Key or equivalent.
1993-03-21 12:45:37 +03:00
*/
domain = NULL;
if (gethostname(localhost, sizeof(localhost)) < 0)
syslog(LOG_ERR, "couldn't get local hostname: %m");
else
domain = strchr(localhost, '.');
localhost[sizeof(localhost) - 1] = '\0';
1993-03-21 12:45:37 +03:00
fflag = hflag = pflag = sflag = 0;
1993-03-21 12:45:37 +03:00
uid = getuid();
while ((ch = getopt(argc, argv, "fh:ps")) != -1)
1993-03-21 12:45:37 +03:00
switch (ch) {
case 'f':
fflag = 1;
break;
case 'h':
if (uid)
errx(1, "-h option: %s", strerror(EPERM));
1993-03-21 12:45:37 +03:00
hflag = 1;
if (domain && (p = strchr(optarg, '.')) != NULL &&
1993-03-21 12:45:37 +03:00
strcasecmp(p, domain) == 0)
*p = 0;
hostname = optarg;
break;
case 'p':
pflag = 1;
break;
case 's':
sflag = 1;
break;
1993-03-21 12:45:37 +03:00
default:
case '?':
1993-03-21 12:45:37 +03:00
(void)fprintf(stderr,
"usage: login [-fps] [-h hostname] [username]\n");
1993-03-21 12:45:37 +03:00
exit(1);
}
argc -= optind;
argv += optind;
1993-04-27 03:13:43 +04:00
1993-03-21 12:45:37 +03:00
if (*argv) {
username = *argv;
ask = 0;
} else
ask = 1;
for (cnt = getdtablesize(); cnt > 2; cnt--)
1993-04-27 03:13:43 +04:00
(void)close(cnt);
1993-03-21 12:45:37 +03:00
1993-04-27 03:13:43 +04:00
ttyn = ttyname(STDIN_FILENO);
1993-03-21 12:45:37 +03:00
if (ttyn == NULL || *ttyn == '\0') {
1993-04-27 03:13:43 +04:00
(void)snprintf(tname, sizeof(tname), "%s??", _PATH_TTY);
1993-03-21 12:45:37 +03:00
ttyn = tname;
}
if ((tty = strrchr(ttyn, '/')) != NULL)
1993-03-21 12:45:37 +03:00
++tty;
else
tty = ttyn;
#ifdef KERBEROS5
kerror = krb5_init_context(&kcontext);
if (kerror) {
syslog(LOG_NOTICE, "%s when initializing Kerberos context",
error_message(kerror));
exit(1);
}
#endif KERBEROS5
1993-03-21 12:45:37 +03:00
for (cnt = 0;; ask = 1) {
#if defined(KERBEROS) || defined(KERBEROS5)
kdestroy();
#endif
1993-03-21 12:45:37 +03:00
if (ask) {
fflag = 0;
getloginname();
}
1993-04-27 03:13:43 +04:00
rootlogin = 0;
#ifdef KERBEROS
if ((instance = strchr(username, '.')) != NULL)
1993-03-21 12:45:37 +03:00
*instance++ = '\0';
else
1993-03-21 12:45:37 +03:00
instance = "";
#endif
#ifdef KERBEROS5
if ((instance = strchr(username, '/')) != NULL)
*instance++ = '\0';
else
instance = "";
1993-03-21 12:45:37 +03:00
#endif
if (strlen(username) > MAXLOGNAME)
username[MAXLOGNAME] = '\0';
1993-03-21 12:45:37 +03:00
/*
* Note if trying multiple user names; log failures for
* previous user name, but don't bother logging one failure
* for nonexistent name (mistyped username).
*/
if (failures && strcmp(tbuf, username)) {
if (failures > (pwd ? 0 : 1))
badlogin(tbuf);
failures = 0;
}
1997-02-11 11:15:08 +03:00
(void)strncpy(tbuf, username, sizeof(tbuf) - 1);
tbuf[sizeof(tbuf) - 1] = '\0';
1993-03-21 12:45:37 +03:00
if ((pwd = getpwnam(username)) != NULL)
1993-03-21 12:45:37 +03:00
salt = pwd->pw_passwd;
else
salt = "xx";
/*
* if we have a valid account name, and it doesn't have a
* password, or the -f option was specified and the caller
* is root or the caller isn't changing their uid, don't
* authenticate.
*/
if (pwd) {
if (pwd->pw_uid == 0)
rootlogin = 1;
1993-12-02 07:30:47 +03:00
if (fflag && (uid == 0 || uid == pwd->pw_uid)) {
/* already authenticated */
break;
} else if (pwd->pw_passwd[0] == '\0') {
/* pretend password okay */
rval = 0;
goto ttycheck;
}
}
1993-03-21 12:45:37 +03:00
fflag = 0;
(void)setpriority(PRIO_PROCESS, 0, -4);
1997-10-12 16:31:40 +04:00
#ifdef SKEY
if (skey_haskey(username) == 0) {
static char skprompt[80];
char *skinfo = skey_keyinfo(username);
(void)snprintf(skprompt, sizeof(skprompt)-1,
"Password [%s]:",
skinfo ? skinfo : "error getting challenge");
pwprompt = skprompt;
} else
#endif
pwprompt = "Password:";
1997-10-12 16:31:40 +04:00
p = getpass(pwprompt);
1993-03-21 12:45:37 +03:00
if (pwd == NULL) {
rval = 1;
goto skip;
}
#ifdef KERBEROS
if (klogin(pwd, instance, localhost, p) == 0) {
rval = 0;
goto skip;
}
1993-03-21 12:45:37 +03:00
#endif
#ifdef KERBEROS5
if (klogin(pwd, instance, localhost, p) == 0) {
rval = 0;
goto skip;
1993-03-21 12:45:37 +03:00
}
#endif
#ifdef SKEY
if (skey_haskey(username) == 0 &&
skey_passcheck(username, p) != -1) {
rval = 0;
goto skip;
}
#endif
if (!sflag && *pwd->pw_passwd != '\0' &&
!strcmp(crypt(p, pwd->pw_passwd), pwd->pw_passwd)) {
rval = 0;
require_chpass = 1;
goto skip;
}
rval = 1;
skip:
memset(p, 0, strlen(p));
1993-03-21 12:45:37 +03:00
(void)setpriority(PRIO_PROCESS, 0, 0);
ttycheck:
1993-03-21 12:45:37 +03:00
/*
* If trying to log in as root without Kerberos,
* but with insecure terminal, refuse the login attempt.
*/
if (pwd && !rval && rootlogin && !rootterm(tty)) {
1993-03-21 12:45:37 +03:00
(void)fprintf(stderr,
"%s login refused on this terminal.\n",
pwd->pw_name);
if (hostname)
syslog(LOG_NOTICE,
"LOGIN %s REFUSED FROM %s ON TTY %s",
pwd->pw_name, hostname, tty);
else
syslog(LOG_NOTICE,
"LOGIN %s REFUSED ON TTY %s",
pwd->pw_name, tty);
continue;
}
if (pwd && !rval)
break;
(void)printf("Login incorrect\n");
failures++;
/* we allow 10 tries, but after 3 we start backing off */
if (++cnt > 3) {
if (cnt >= 10) {
badlogin(username);
sleepexit(1);
}
sleep((u_int)((cnt - 3) * 5));
}
}
/* committed to login -- turn off timeout */
(void)alarm((u_int)0);
endpwent();
/* if user not super-user, check for disabled logins */
if (!rootlogin)
checknologin();
/* Temporarily give up special privileges so we can change */
/* into NFS-mounted homes that are exported for non-root */
/* access and have mode 7x0 */
saved_uid = geteuid();
saved_gid = getegid();
nsaved_gids = getgroups(NGROUPS_MAX, saved_gids);
(void)setegid(pwd->pw_gid);
initgroups(username, pwd->pw_gid);
(void)seteuid(pwd->pw_uid);
1993-03-21 12:45:37 +03:00
if (chdir(pwd->pw_dir) < 0) {
(void)printf("No home directory %s!\n", pwd->pw_dir);
if (chdir("/"))
exit(0);
pwd->pw_dir = "/";
(void)printf("Logging in with home = \"/\".\n");
}
quietlog = access(_PATH_HUSHLOGIN, F_OK) == 0;
/* regain special privileges */
(void)seteuid(saved_uid);
setgroups(nsaved_gids, saved_gids);
(void)setegid(saved_gid);
1993-03-21 12:45:37 +03:00
if (pwd->pw_change || pwd->pw_expire)
(void)gettimeofday(&tp, (struct timezone *)NULL);
if (pwd->pw_expire)
if (tp.tv_sec >= pwd->pw_expire) {
(void)printf("Sorry -- your account has expired.\n");
sleepexit(1);
} else if (pwd->pw_expire - tp.tv_sec <
1997-06-27 20:42:22 +04:00
_PASSWORD_WARNDAYS * SECSPERDAY && !quietlog)
1993-03-21 12:45:37 +03:00
(void)printf("Warning: your account expires on %s",
ctime(&pwd->pw_expire));
if (pwd->pw_change)
if (pwd->pw_change == _PASSWORD_CHGNOW)
need_chpass = 1;
else if (tp.tv_sec >= pwd->pw_change) {
(void)printf("Sorry -- your password has expired.\n");
sleepexit(1);
} else if (pwd->pw_change - tp.tv_sec <
_PASSWORD_WARNDAYS * SECSPERDAY && !quietlog)
(void)printf("Warning: your password expires on %s",
ctime(&pwd->pw_change));
1993-03-21 12:45:37 +03:00
1993-04-27 03:13:43 +04:00
/* Nothing else left to fail -- really log in. */
memset((void *)&utmp, 0, sizeof(utmp));
1993-04-27 03:13:43 +04:00
(void)time(&utmp.ut_time);
(void)strncpy(utmp.ut_name, username, sizeof(utmp.ut_name));
if (hostname)
(void)strncpy(utmp.ut_host, hostname, sizeof(utmp.ut_host));
(void)strncpy(utmp.ut_line, tty, sizeof(utmp.ut_line));
login(&utmp);
1993-03-21 12:45:37 +03:00
dolastlog(quietlog);
(void)chown(ttyn, pwd->pw_uid,
(gr = getgrnam(TTYGRPNAME)) ? gr->gr_gid : pwd->pw_gid);
if (ttyaction(ttyn, "login", pwd->pw_name))
(void)printf("Warning: ttyaction failed.\n");
#if defined(KERBEROS) || defined(KERBEROS5)
/* Fork so that we can call kdestroy */
if (krbtkfile_env)
dofork();
#endif
1993-03-21 12:45:37 +03:00
(void)setgid(pwd->pw_gid);
initgroups(username, pwd->pw_gid);
if (*pwd->pw_shell == '\0')
pwd->pw_shell = _PATH_BSHELL;
1993-04-27 03:13:43 +04:00
/* Destroy environment unless user has requested its preservation. */
1993-03-21 12:45:37 +03:00
if (!pflag)
environ = envinit;
(void)setenv("HOME", pwd->pw_dir, 1);
(void)setenv("SHELL", pwd->pw_shell, 1);
if (term[0] == '\0')
1993-04-27 03:13:43 +04:00
(void)strncpy(term, stypeof(tty), sizeof(term));
1993-03-21 12:45:37 +03:00
(void)setenv("TERM", term, 0);
(void)setenv("LOGNAME", pwd->pw_name, 1);
(void)setenv("USER", pwd->pw_name, 1);
(void)setenv("PATH", _PATH_DEFPATH, 0);
#ifdef KERBEROS
if (krbtkfile_env)
(void)setenv("KRBTKFILE", krbtkfile_env, 1);
#endif
#ifdef KERBEROS5
if (krbtkfile_env)
(void)setenv("KRB5CCNAME", krbtkfile_env, 1);
#endif
1993-03-21 12:45:37 +03:00
if (tty[sizeof("tty")-1] == 'd')
syslog(LOG_INFO, "DIALUP %s, %s", tty, pwd->pw_name);
1993-04-27 03:13:43 +04:00
/* If fflag is on, assume caller/authenticator has logged root login. */
1993-03-21 12:45:37 +03:00
if (rootlogin && fflag == 0)
if (hostname)
syslog(LOG_NOTICE, "ROOT LOGIN (%s) ON %s FROM %s",
username, tty, hostname);
else
syslog(LOG_NOTICE, "ROOT LOGIN (%s) ON %s", username, tty);
#if defined(KERBEROS) || defined(KERBEROS5)
1993-03-21 12:45:37 +03:00
if (!quietlog && notickets == 1)
(void)printf("Warning: no Kerberos tickets issued.\n");
#endif
if (!quietlog) {
1998-01-07 03:41:43 +03:00
(void)printf(copyrightstr);
1993-03-21 12:45:37 +03:00
motd();
1993-04-27 03:13:43 +04:00
(void)snprintf(tbuf,
sizeof(tbuf), "%s/%s", _PATH_MAILDIR, pwd->pw_name);
1993-03-21 12:45:37 +03:00
if (stat(tbuf, &st) == 0 && st.st_size != 0)
(void)printf("You have %smail.\n",
(st.st_mtime > st.st_atime) ? "new " : "");
}
(void)signal(SIGALRM, SIG_DFL);
(void)signal(SIGQUIT, SIG_DFL);
(void)signal(SIGINT, SIG_DFL);
(void)signal(SIGTSTP, SIG_IGN);
tbuf[0] = '-';
1997-02-11 11:15:08 +03:00
(void)strncpy(tbuf + 1, (p = strrchr(pwd->pw_shell, '/')) ?
p + 1 : pwd->pw_shell, sizeof(tbuf) - 2);
1993-03-21 12:45:37 +03:00
if (setlogin(pwd->pw_name) < 0)
syslog(LOG_ERR, "setlogin() failure: %m");
1993-04-27 03:13:43 +04:00
/* Discard permissions last so can't get killed and drop core. */
1993-03-21 12:45:37 +03:00
if (rootlogin)
(void)setuid(0);
1993-03-21 12:45:37 +03:00
else
(void)setuid(pwd->pw_uid);
/* Wait to change password until we're unprivileged */
if (need_chpass) {
if (!require_chpass)
(void)printf(
"Warning: your password has expired. Please change it as soon as possible.\n");
else {
int status;
(void)printf(
"Your password has expired. Please choose a new one.\n");
switch (fork()) {
case -1:
warn("fork");
sleepexit(1);
case 0:
execl(_PATH_BINPASSWD, "passwd", 0);
_exit(1);
default:
if (wait(&status) == -1 ||
WEXITSTATUS(status))
sleepexit(1);
}
}
}
1993-03-21 12:45:37 +03:00
execlp(pwd->pw_shell, tbuf, 0);
err(1, "%s", pwd->pw_shell);
1993-03-21 12:45:37 +03:00
}
#if defined(KERBEROS) || defined(KERBEROS5)
#define NBUFSIZ (MAXLOGNAME + 1 + 5) /* .root suffix */
1993-03-21 12:45:37 +03:00
#else
#define NBUFSIZ (MAXLOGNAME + 1)
1993-03-21 12:45:37 +03:00
#endif
#if defined(KERBEROS) || defined(KERBEROS5)
/*
* This routine handles cleanup stuff, and the like.
* It exists only in the child process.
*/
#include <sys/wait.h>
void
dofork()
{
int child;
if (!(child = fork()))
return; /* Child process */
/* Setup stuff? This would be things we could do in parallel with login */
(void) chdir("/"); /* Let's not keep the fs busy... */
/* If we're the parent, watch the child until it dies */
while (wait(0) != child)
;
/* Cleanup stuff */
/* Run kdestroy to destroy tickets */
kdestroy();
/* Leave */
exit(0);
}
#endif
1993-04-27 03:13:43 +04:00
void
1993-03-21 12:45:37 +03:00
getloginname()
{
int ch;
char *p;
1993-03-21 12:45:37 +03:00
static char nbuf[NBUFSIZ];
for (;;) {
(void)printf("login: ");
for (p = nbuf; (ch = getchar()) != '\n'; ) {
if (ch == EOF) {
badlogin(username);
exit(0);
}
if (p < nbuf + (NBUFSIZ - 1))
*p++ = ch;
}
if (p > nbuf)
if (nbuf[0] == '-')
(void)fprintf(stderr,
"login names may not start with '-'.\n");
else {
*p = '\0';
username = nbuf;
break;
}
}
}
1993-04-27 03:13:43 +04:00
int
1993-03-21 12:45:37 +03:00
rootterm(ttyn)
char *ttyn;
{
struct ttyent *t;
return ((t = getttynam(ttyn)) && t->ty_status & TTY_SECURE);
1993-03-21 12:45:37 +03:00
}
jmp_buf motdinterrupt;
1993-04-27 03:13:43 +04:00
void
1993-03-21 12:45:37 +03:00
motd()
{
int fd, nchars;
1993-03-21 12:45:37 +03:00
sig_t oldint;
char tbuf[8192];
if ((fd = open(_PATH_MOTDFILE, O_RDONLY, 0)) < 0)
return;
oldint = signal(SIGINT, sigint);
if (setjmp(motdinterrupt) == 0)
while ((nchars = read(fd, tbuf, sizeof(tbuf))) > 0)
(void)write(fileno(stdout), tbuf, nchars);
(void)signal(SIGINT, oldint);
(void)close(fd);
}
1993-04-27 03:13:43 +04:00
/* ARGSUSED */
1993-03-21 12:45:37 +03:00
void
1993-04-27 03:13:43 +04:00
sigint(signo)
int signo;
1993-03-21 12:45:37 +03:00
{
1993-03-21 12:45:37 +03:00
longjmp(motdinterrupt, 1);
}
1993-04-27 03:13:43 +04:00
/* ARGSUSED */
void
timedout(signo)
int signo;
{
1993-04-27 03:13:43 +04:00
(void)fprintf(stderr, "Login timed out after %d seconds\n", timeout);
exit(0);
}
void
1993-03-21 12:45:37 +03:00
checknologin()
{
int fd, nchars;
1993-03-21 12:45:37 +03:00
char tbuf[8192];
if ((fd = open(_PATH_NOLOGIN, O_RDONLY, 0)) >= 0) {
while ((nchars = read(fd, tbuf, sizeof(tbuf))) > 0)
(void)write(fileno(stdout), tbuf, nchars);
sleepexit(0);
}
}
1993-04-27 03:13:43 +04:00
void
1993-03-21 12:45:37 +03:00
dolastlog(quiet)
int quiet;
{
struct lastlog ll;
int fd;
if ((fd = open(_PATH_LASTLOG, O_RDWR, 0)) >= 0) {
(void)lseek(fd, (off_t)(pwd->pw_uid * sizeof(ll)), SEEK_SET);
1993-03-21 12:45:37 +03:00
if (!quiet) {
if (read(fd, (char *)&ll, sizeof(ll)) == sizeof(ll) &&
ll.ll_time != 0) {
(void)printf("Last login: %.*s ",
24-5, (char *)ctime(&ll.ll_time));
if (*ll.ll_host != '\0')
(void)printf("from %.*s\n",
1993-04-27 03:13:43 +04:00
(int)sizeof(ll.ll_host),
ll.ll_host);
1993-03-21 12:45:37 +03:00
else
(void)printf("on %.*s\n",
1993-04-27 03:13:43 +04:00
(int)sizeof(ll.ll_line),
ll.ll_line);
1993-03-21 12:45:37 +03:00
}
(void)lseek(fd, (off_t)(pwd->pw_uid * sizeof(ll)),
SEEK_SET);
1993-03-21 12:45:37 +03:00
}
memset((void *)&ll, 0, sizeof(ll));
1993-03-21 12:45:37 +03:00
(void)time(&ll.ll_time);
1993-04-27 03:13:43 +04:00
(void)strncpy(ll.ll_line, tty, sizeof(ll.ll_line));
1993-03-21 12:45:37 +03:00
if (hostname)
1993-04-27 03:13:43 +04:00
(void)strncpy(ll.ll_host, hostname, sizeof(ll.ll_host));
1993-03-21 12:45:37 +03:00
(void)write(fd, (char *)&ll, sizeof(ll));
(void)close(fd);
}
}
1993-04-27 03:13:43 +04:00
void
1993-03-21 12:45:37 +03:00
badlogin(name)
char *name;
{
if (failures == 0)
return;
if (hostname) {
syslog(LOG_NOTICE, "%d LOGIN FAILURE%s FROM %s",
failures, failures > 1 ? "S" : "", hostname);
syslog(LOG_AUTHPRIV|LOG_NOTICE,
"%d LOGIN FAILURE%s FROM %s, %s",
failures, failures > 1 ? "S" : "", hostname, name);
} else {
syslog(LOG_NOTICE, "%d LOGIN FAILURE%s ON %s",
failures, failures > 1 ? "S" : "", tty);
syslog(LOG_AUTHPRIV|LOG_NOTICE,
"%d LOGIN FAILURE%s ON %s, %s",
failures, failures > 1 ? "S" : "", tty, name);
}
}
#undef UNKNOWN
#define UNKNOWN "su"
1998-07-27 01:58:46 +04:00
const char *
1993-03-21 12:45:37 +03:00
stypeof(ttyid)
1998-07-27 01:58:46 +04:00
const char *ttyid;
1993-03-21 12:45:37 +03:00
{
struct ttyent *t;
return (ttyid && (t = getttynam(ttyid)) ? t->ty_type : UNKNOWN);
1993-03-21 12:45:37 +03:00
}
1993-04-27 03:13:43 +04:00
void
1993-03-21 12:45:37 +03:00
sleepexit(eval)
int eval;
{
(void)sleep(5);
1993-03-21 12:45:37 +03:00
exit(eval);
}