/* $NetBSD: yp_passwd.c,v 1.27 2003/08/07 11:15:27 agc Exp $ */ /* * Copyright (c) 1988, 1990, 1993, 1994 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include #ifndef lint #if 0 static char sccsid[] = "from: @(#)local_passwd.c 8.3 (Berkeley) 4/2/94"; #else __RCSID("$NetBSD: yp_passwd.c,v 1.27 2003/08/07 11:15:27 agc Exp $"); #endif #endif /* not lint */ #ifdef YP #include #include #include #include #include #include #include #include #include #include #include #include #include #include "extern.h" #define passwd yp_passwd_rec #include #undef passwd #ifndef _PASSWORD_LEN #define _PASSWORD_LEN PASS_MAX #endif static int yflag; static char *getnewpasswd __P((struct passwd *, char **)); static int ypgetpwnam __P((const char *)); static void pw_error __P((char *, int, int)); static uid_t uid; char *domain; static void pw_error(name, err, eval) char *name; int err, eval; { if (err) warn("%s", name); errx(eval, "YP passwd database unchanged"); } int yp_init(progname) const char *progname; { int yppwd; if (strcmp(progname, "yppasswd") == 0) { yppwd = 1; } else yppwd = 0; yflag = 0; if (_yp_check(NULL) == 0) { /* can't use YP. */ if (yppwd) errx(1, "YP not in use."); return(-1); } return (0); } int yp_arg(ch, arg) char ch; const char *arg; { switch (ch) { case 'y': yflag = 1; break; default: return(0); } return(1); } int yp_arg_end() { if (yflag) return (PW_USE_FORCE); return (PW_USE); } void yp_end() { /* NOOP */ } int yp_chpw(username) const char *username; { char *master; int r, rpcport, status; struct yppasswd yppasswd; struct passwd *pw; struct timeval tv; CLIENT *client; uid = getuid(); /* * Get local domain */ if ((r = yp_get_default_domain(&domain)) != 0) errx(1, "can't get local YP domain. Reason: %s", yperr_string(r)); /* * Find the host for the passwd map; it should be running * the daemon. */ if ((r = yp_master(domain, "passwd.byname", &master)) != 0) { warnx("can't find the master YP server. Reason: %s", yperr_string(r)); /* continuation */ return(-1); } /* * Ask the portmapper for the port of the daemon. */ if ((rpcport = getrpcport(master, YPPASSWDPROG, YPPASSWDPROC_UPDATE, IPPROTO_UDP)) == 0) { warnx("master YP server not running yppasswd daemon.\n\t%s\n", "Can't change YP password."); /* continuation */ return(-1); } /* * Be sure the port is privileged */ if (rpcport >= IPPORT_RESERVED) errx(1, "yppasswd daemon is on an invalid port."); /* Bail out if this is a local (non-yp) user, */ /* then get user's login identity */ if (!ypgetpwnam(username) || !(pw = getpwnam(username))) { warnx("YP unknown user %s", username); /* continuation */ return(-1); } if (uid && uid != pw->pw_uid) errx(1, "you may only change your own password: %s", strerror(EACCES)); /* prompt for new password */ yppasswd.newpw.pw_passwd = getnewpasswd(pw, &yppasswd.oldpass); /* tell rpc.yppasswdd */ yppasswd.newpw.pw_name = strdup(pw->pw_name); if (!yppasswd.newpw.pw_name) { err(1, "strdup"); /*NOTREACHED*/ } yppasswd.newpw.pw_uid = pw->pw_uid; yppasswd.newpw.pw_gid = pw->pw_gid; yppasswd.newpw.pw_gecos = strdup(pw->pw_gecos); if (!yppasswd.newpw.pw_gecos) { err(1, "strdup"); /*NOTREACHED*/ } yppasswd.newpw.pw_dir = strdup(pw->pw_dir); if (!yppasswd.newpw.pw_dir) { err(1, "strdup"); /*NOTREACHED*/ } yppasswd.newpw.pw_shell = strdup(pw->pw_shell); if (!yppasswd.newpw.pw_shell) { err(1, "strdup"); /*NOTREACHED*/ } client = clnt_create(master, YPPASSWDPROG, YPPASSWDVERS, "udp"); if (client == NULL) { warnx("cannot contact yppasswdd on %s: Reason: %s", master, yperr_string(YPERR_YPBIND)); return (YPERR_YPBIND); } client->cl_auth = authunix_create_default(); tv.tv_sec = 2; tv.tv_usec = 0; r = clnt_call(client, YPPASSWDPROC_UPDATE, xdr_yppasswd, &yppasswd, xdr_int, &status, tv); if (r) errx(1, "rpc to yppasswdd failed."); else if (status) printf("Couldn't change YP password.\n"); else printf("The YP password has been changed on %s, %s\n", master, "the master YP passwd server."); return(0); } static char * getnewpasswd(pw, old_pass) struct passwd *pw; char **old_pass; { int tries; char *p, *t; static char buf[_PASSWORD_LEN+1]; char salt[_PASSWORD_LEN+1]; (void)printf("Changing YP password for %s.\n", pw->pw_name); if (old_pass) { *old_pass = NULL; if (pw->pw_passwd[0]) { if (strcmp(crypt(p = getpass("Old password:"), pw->pw_passwd), pw->pw_passwd)) { (void)printf("Sorry.\n"); pw_error(NULL, 0, 1); } } else { p = ""; } *old_pass = strdup(p); if (!*old_pass) { (void)printf("not enough core.\n"); pw_error(NULL, 0, 1); } } for (buf[0] = '\0', tries = 0;;) { p = getpass("New password:"); if (!*p) { (void)printf("Password unchanged.\n"); pw_error(NULL, 0, 0); } if (strlen(p) <= 5 && ++tries < 2) { (void)printf("Please enter a longer password.\n"); continue; } for (t = p; *t && islower(*t); ++t); if (!*t && ++tries < 2) { (void)printf("Please don't use an all-lower case " "password.\nUnusual capitalization, " "control characters or digits are " "suggested.\n"); continue; } (void)strlcpy(buf, p, sizeof(buf)); if (!strcmp(buf, getpass("Retype new password:"))) break; (void)printf("Mismatch; try again, EOF to quit.\n"); } if (!pwd_gensalt(salt, _PASSWORD_LEN, pw, 'y' )) { (void)printf("Couldn't generate salt.\n"); pw_error(NULL, 0, 0); } p = strdup(crypt(buf, salt)); if (!p) { (void)printf("not enough core.\n"); pw_error(NULL, 0, 0); } return (p); } static int ypgetpwnam(nam) const char *nam; { char *val; int reason, vallen; val = NULL; reason = yp_match(domain, "passwd.byname", nam, strlen(nam), &val, &vallen); if (reason != 0) { if (val != NULL) free(val); return 0; } free(val); return 1; } #endif /* YP */