2012-09-20 07:51:34 +04:00
|
|
|
/**
|
|
|
|
* xrdp: A Remote Desktop Protocol server.
|
|
|
|
*
|
2013-06-08 21:51:53 +04:00
|
|
|
* Copyright (C) Jay Sorg 2004-2013
|
2012-09-20 07:51:34 +04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
2005-10-06 23:27:38 +04:00
|
|
|
|
2005-11-14 01:06:49 +03:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @file env.c
|
|
|
|
* @brief User environment handling code
|
|
|
|
* @author Jay Sorg
|
2012-09-20 07:51:34 +04:00
|
|
|
*
|
2005-11-14 01:06:49 +03:00
|
|
|
*/
|
|
|
|
|
2014-05-10 03:02:19 +04:00
|
|
|
#include "list.h"
|
2005-10-06 23:27:38 +04:00
|
|
|
#include "sesman.h"
|
2006-07-01 18:25:12 +04:00
|
|
|
#include "grp.h"
|
2015-08-19 03:33:13 +03:00
|
|
|
#include "ssl_calls.h"
|
2016-12-13 15:24:15 +03:00
|
|
|
#include "os_calls.h"
|
2006-07-01 18:25:12 +04:00
|
|
|
|
2006-08-23 07:48:03 +04:00
|
|
|
extern unsigned char g_fixedkey[8]; /* in sesman.c */
|
2012-09-20 07:51:34 +04:00
|
|
|
extern struct config_sesman *g_cfg; /* in sesman.c */
|
2005-10-06 23:27:38 +04:00
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
int DEFAULT_CC
|
2016-10-17 09:14:06 +03:00
|
|
|
env_check_password_file(const char *filename, const char *passwd)
|
2005-10-06 23:27:38 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
char encryptedPasswd[16];
|
2015-08-19 03:33:13 +03:00
|
|
|
char key[24];
|
2015-10-11 01:44:31 +03:00
|
|
|
char passwd_hash[20];
|
|
|
|
char passwd_hash_text[40];
|
2012-09-20 07:51:34 +04:00
|
|
|
int fd;
|
2015-10-11 01:44:31 +03:00
|
|
|
int passwd_bytes;
|
|
|
|
void *des;
|
|
|
|
void *sha1;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2016-02-14 07:41:07 +03:00
|
|
|
/* create password hash from password */
|
2015-10-11 01:44:31 +03:00
|
|
|
passwd_bytes = g_strlen(passwd);
|
|
|
|
sha1 = ssl_sha1_info_create();
|
|
|
|
ssl_sha1_transform(sha1, "xrdp_vnc", 8);
|
|
|
|
ssl_sha1_transform(sha1, passwd, passwd_bytes);
|
|
|
|
ssl_sha1_transform(sha1, passwd, passwd_bytes);
|
|
|
|
ssl_sha1_complete(sha1, passwd_hash);
|
|
|
|
ssl_sha1_info_delete(sha1);
|
|
|
|
g_snprintf(passwd_hash_text, 39, "%2.2x%2.2x%2.2x%2.2x",
|
|
|
|
(tui8)passwd_hash[0], (tui8)passwd_hash[1],
|
|
|
|
(tui8)passwd_hash[2], (tui8)passwd_hash[3]);
|
|
|
|
passwd_hash_text[39] = 0;
|
|
|
|
passwd = passwd_hash_text;
|
|
|
|
|
|
|
|
/* create file from password */
|
2015-08-19 03:33:13 +03:00
|
|
|
g_memset(encryptedPasswd, 0, sizeof(encryptedPasswd));
|
2015-10-11 01:44:31 +03:00
|
|
|
g_strncpy(encryptedPasswd, passwd, 8);
|
2015-08-19 03:33:13 +03:00
|
|
|
g_memset(key, 0, sizeof(key));
|
|
|
|
g_mirror_memcpy(key, g_fixedkey, 8);
|
|
|
|
des = ssl_des3_encrypt_info_create(key, 0);
|
|
|
|
ssl_des3_encrypt(des, 8, encryptedPasswd, encryptedPasswd);
|
|
|
|
ssl_des3_info_delete(des);
|
2015-10-11 01:44:31 +03:00
|
|
|
fd = g_file_open_ex(filename, 0, 1, 1, 1);
|
2012-09-20 07:51:34 +04:00
|
|
|
if (fd == -1)
|
|
|
|
{
|
|
|
|
log_message(LOG_LEVEL_WARNING,
|
2016-11-07 07:31:59 +03:00
|
|
|
"Cannot write VNC password hash to file %s: %s",
|
|
|
|
filename, g_get_strerror());
|
2012-09-20 07:51:34 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
g_file_write(fd, encryptedPasswd, 8);
|
|
|
|
g_file_close(fd);
|
|
|
|
return 0;
|
2005-10-06 23:27:38 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
2016-07-22 11:48:37 +03:00
|
|
|
/* its the responsibility of the caller to free passwd_file */
|
2005-10-06 23:27:38 +04:00
|
|
|
int DEFAULT_CC
|
2016-10-17 09:14:06 +03:00
|
|
|
env_set_user(const char *username, char **passwd_file, int display,
|
|
|
|
const struct list *env_names, const struct list *env_values)
|
2005-10-06 23:27:38 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
int error;
|
|
|
|
int pw_uid;
|
|
|
|
int pw_gid;
|
|
|
|
int uid;
|
2014-05-10 03:02:19 +04:00
|
|
|
int index;
|
2016-07-22 11:48:37 +03:00
|
|
|
int len;
|
2014-05-10 03:02:19 +04:00
|
|
|
char *name;
|
|
|
|
char *value;
|
2016-07-22 11:48:37 +03:00
|
|
|
char *pw_shell;
|
|
|
|
char *pw_dir;
|
2012-09-20 07:51:34 +04:00
|
|
|
char text[256];
|
|
|
|
|
2016-07-22 11:48:37 +03:00
|
|
|
pw_shell = 0;
|
|
|
|
pw_dir = 0;
|
|
|
|
|
|
|
|
error = g_getuser_info(username, &pw_gid, &pw_uid, &pw_shell, &pw_dir, 0);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2005-10-06 23:27:38 +04:00
|
|
|
if (error == 0)
|
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
g_rm_temp_dir();
|
|
|
|
error = g_setgid(pw_gid);
|
|
|
|
|
|
|
|
if (error == 0)
|
2007-05-07 01:02:25 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
error = g_initgroups(username, pw_gid);
|
2007-05-07 01:02:25 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
|
|
if (error == 0)
|
2010-08-10 03:06:51 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
uid = pw_uid;
|
|
|
|
error = g_setuid(uid);
|
2007-05-07 01:02:25 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
|
|
g_mk_temp_dir(0);
|
|
|
|
|
|
|
|
if (error == 0)
|
|
|
|
{
|
|
|
|
g_clearenv();
|
|
|
|
g_setenv("SHELL", pw_shell, 1);
|
2016-06-20 03:47:37 +03:00
|
|
|
g_setenv("PATH", "/sbin:/bin:/usr/bin:/usr/local/bin", 1);
|
2012-09-20 07:51:34 +04:00
|
|
|
g_setenv("USER", username, 1);
|
|
|
|
g_sprintf(text, "%d", uid);
|
|
|
|
g_setenv("UID", text, 1);
|
|
|
|
g_setenv("HOME", pw_dir, 1);
|
|
|
|
g_set_current_dir(pw_dir);
|
|
|
|
g_sprintf(text, ":%d.0", display);
|
|
|
|
g_setenv("DISPLAY", text, 1);
|
2013-07-31 02:03:34 +04:00
|
|
|
g_setenv("XRDP_SESSION", "1", 1);
|
2014-05-10 03:02:19 +04:00
|
|
|
if ((env_names != 0) && (env_values != 0) &&
|
|
|
|
(env_names->count == env_values->count))
|
|
|
|
{
|
|
|
|
for (index = 0; index < env_names->count; index++)
|
|
|
|
{
|
|
|
|
name = (char *) list_get_item(env_names, index),
|
|
|
|
value = (char *) list_get_item(env_values, index),
|
|
|
|
g_setenv(name, value, 1);
|
|
|
|
}
|
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
|
|
if (passwd_file != 0)
|
|
|
|
{
|
|
|
|
if (0 == g_cfg->auth_file_path)
|
|
|
|
{
|
|
|
|
/* if no auth_file_path is set, then we go for
|
2016-07-22 11:48:37 +03:00
|
|
|
$HOME/.vnc/sesman_username_passwd */
|
2016-11-07 09:06:24 +03:00
|
|
|
if (!g_directory_exist(".vnc"))
|
2014-07-21 00:14:09 +04:00
|
|
|
{
|
2016-11-07 09:06:24 +03:00
|
|
|
if (g_mkdir(".vnc") < 0)
|
|
|
|
{
|
|
|
|
log_message(LOG_LEVEL_ERROR,
|
|
|
|
"Error creating .vnc directory: %s",
|
|
|
|
g_get_strerror());
|
|
|
|
}
|
2016-07-22 11:48:37 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
len = g_snprintf(NULL, 0, "%s/.vnc/sesman_%s_passwd", pw_dir, username);
|
|
|
|
|
|
|
|
*passwd_file = (char *) g_malloc(len + 1, 1);
|
|
|
|
if (*passwd_file != NULL)
|
|
|
|
{
|
|
|
|
g_sprintf(*passwd_file, "%s/.vnc/sesman_%s_passwd", pw_dir, username);
|
2014-07-21 00:14:09 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* we use auth_file_path as requested */
|
2016-07-22 11:48:37 +03:00
|
|
|
len = g_snprintf(NULL, 0, g_cfg->auth_file_path, username);
|
|
|
|
|
|
|
|
*passwd_file = (char *) g_malloc(len + 1, 1);
|
|
|
|
if (*passwd_file != NULL)
|
|
|
|
{
|
|
|
|
g_sprintf(*passwd_file, g_cfg->auth_file_path, username);
|
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
|
|
|
|
2016-07-22 11:48:37 +03:00
|
|
|
if (*passwd_file != NULL)
|
|
|
|
{
|
|
|
|
LOG_DBG("pass file: %s", *passwd_file);
|
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2016-07-22 11:48:37 +03:00
|
|
|
|
|
|
|
g_free(pw_dir);
|
|
|
|
g_free(pw_shell);
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
log_message(LOG_LEVEL_ERROR,
|
2016-07-22 11:48:37 +03:00
|
|
|
"error getting user info for user %s",
|
|
|
|
username);
|
2005-10-06 23:27:38 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
|
|
return error;
|
2005-10-06 23:27:38 +04:00
|
|
|
}
|
2016-12-13 15:24:15 +03:00
|
|
|
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
int DEFAULT_CC
|
|
|
|
env_add_xauth_user(int display, char *cookie, char *file)
|
|
|
|
{
|
2016-12-13 20:53:07 +03:00
|
|
|
FILE *dp;
|
2016-12-13 15:24:15 +03:00
|
|
|
char xauth_str[256];
|
2016-12-13 20:53:07 +03:00
|
|
|
int fd;
|
2016-12-13 15:24:15 +03:00
|
|
|
|
|
|
|
if ( file == NULL )
|
|
|
|
{
|
2016-12-13 20:53:07 +03:00
|
|
|
if (!g_file_exist(".Xauthority"))
|
|
|
|
{
|
|
|
|
fd = g_file_open(".Xauthority");
|
|
|
|
g_file_close(fd);
|
|
|
|
}
|
2016-12-13 15:24:15 +03:00
|
|
|
|
|
|
|
g_sprintf(xauth_str, "xauth -q add :%d . %s", display, cookie);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2016-12-13 20:53:07 +03:00
|
|
|
if (!g_file_exist(file))
|
|
|
|
{
|
|
|
|
fd = g_file_open(file);
|
|
|
|
g_file_close(fd);
|
|
|
|
}
|
2016-12-13 15:24:15 +03:00
|
|
|
|
|
|
|
g_sprintf(xauth_str, "xauth -q -f %s add :%d . %s", file, display, cookie);
|
|
|
|
}
|
|
|
|
log_message(LOG_LEVEL_DEBUG,
|
|
|
|
"xauth command: %s", xauth_str);
|
|
|
|
|
|
|
|
if ( (dp = popen(xauth_str,"r")) == NULL ) {
|
|
|
|
log_message(LOG_LEVEL_INFO, "xauth failed, no X security");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
pclose(dp);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|