2012-09-20 07:51:34 +04:00
|
|
|
/**
|
|
|
|
* xrdp: A Remote Desktop Protocol server.
|
|
|
|
*
|
2013-06-08 21:51:53 +04:00
|
|
|
* Copyright (C) Jay Sorg 2004-2013
|
2012-09-20 07:51:34 +04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
2005-06-05 03:51:51 +04:00
|
|
|
|
2006-05-26 00:34:32 +04:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @file verify_user.c
|
|
|
|
* @brief Authenticate user using standard unix passwd/shadow system
|
2006-11-24 23:46:45 +03:00
|
|
|
* @author Jay Sorg, Simone Fedele
|
2007-04-07 20:20:08 +04:00
|
|
|
*
|
2006-05-26 00:34:32 +04:00
|
|
|
*/
|
|
|
|
|
2017-03-03 07:33:23 +03:00
|
|
|
#if defined(HAVE_CONFIG_H)
|
|
|
|
#include <config_ac.h>
|
|
|
|
#endif
|
|
|
|
|
2005-12-15 23:41:03 +03:00
|
|
|
#include "sesman.h"
|
2005-06-05 03:51:51 +04:00
|
|
|
|
2006-05-31 21:47:43 +04:00
|
|
|
#include <stdio.h>
|
2016-11-07 07:01:49 +03:00
|
|
|
#include <string.h>
|
2005-12-15 23:41:03 +03:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <crypt.h>
|
2005-06-05 03:51:51 +04:00
|
|
|
#include <shadow.h>
|
|
|
|
#include <pwd.h>
|
|
|
|
|
2006-11-24 23:46:45 +03:00
|
|
|
#ifndef SECS_PER_DAY
|
|
|
|
#define SECS_PER_DAY (24L*3600L)
|
|
|
|
#endif
|
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
extern struct config_sesman *g_cfg; /* in sesman.c */
|
2005-12-15 23:41:03 +03:00
|
|
|
|
2017-03-12 19:35:00 +03:00
|
|
|
static int
|
2016-11-07 07:01:49 +03:00
|
|
|
auth_crypt_pwd(const char *pwd, const char *pln, char *crp);
|
2007-04-07 20:20:08 +04:00
|
|
|
|
2017-03-12 19:35:00 +03:00
|
|
|
static int
|
2012-09-20 07:51:34 +04:00
|
|
|
auth_account_disabled(struct spwd *stp);
|
2006-11-24 23:46:45 +03:00
|
|
|
|
2005-06-05 03:51:51 +04:00
|
|
|
/******************************************************************************/
|
|
|
|
/* returns boolean */
|
2017-03-12 19:35:00 +03:00
|
|
|
long
|
2016-10-17 09:14:06 +03:00
|
|
|
auth_userpass(const char *user, const char *pass, int *errorcode)
|
2005-06-05 03:51:51 +04:00
|
|
|
{
|
2013-03-09 08:51:35 +04:00
|
|
|
const char *encr;
|
2014-10-30 03:54:11 +03:00
|
|
|
const char *epass;
|
2012-09-20 07:51:34 +04:00
|
|
|
struct passwd *spw;
|
|
|
|
struct spwd *stp;
|
|
|
|
|
|
|
|
spw = getpwnam(user);
|
|
|
|
|
|
|
|
if (spw == 0)
|
2005-06-05 03:51:51 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
2005-06-05 03:51:51 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
|
|
if (g_strncmp(spw->pw_passwd, "x", 3) == 0)
|
2006-11-24 23:46:45 +03:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
/* the system is using shadow */
|
|
|
|
stp = getspnam(user);
|
|
|
|
|
|
|
|
if (stp == 0)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (1 == auth_account_disabled(stp))
|
|
|
|
{
|
2012-07-21 21:25:40 +04:00
|
|
|
log_message(LOG_LEVEL_INFO, "account %s is disabled", user);
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-03-09 08:51:35 +04:00
|
|
|
encr = stp->sp_pwdp;
|
2006-11-24 23:46:45 +03:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
else
|
2005-06-05 03:51:51 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
/* old system with only passwd */
|
2013-03-09 08:51:35 +04:00
|
|
|
encr = spw->pw_passwd;
|
2005-06-05 03:51:51 +04:00
|
|
|
}
|
2014-10-30 03:54:11 +03:00
|
|
|
epass = crypt(pass, encr);
|
|
|
|
if (epass == 0)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return (strcmp(encr, epass) == 0);
|
2005-06-05 03:51:51 +04:00
|
|
|
}
|
2005-07-19 06:22:33 +04:00
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
/* returns error */
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2005-12-15 23:41:03 +03:00
|
|
|
auth_start_session(long in_val, int in_display)
|
2005-07-19 06:22:33 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
2005-07-19 06:22:33 +04:00
|
|
|
}
|
|
|
|
|
2014-11-23 10:17:00 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
/* returns error */
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2014-11-23 10:17:00 +03:00
|
|
|
auth_stop_session(long in_val)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-07-19 06:22:33 +04:00
|
|
|
/******************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2005-12-15 23:41:03 +03:00
|
|
|
auth_end(long in_val)
|
2005-07-19 06:22:33 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
2005-07-19 06:22:33 +04:00
|
|
|
}
|
2005-08-14 06:22:11 +04:00
|
|
|
|
|
|
|
/******************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2005-12-15 23:41:03 +03:00
|
|
|
auth_set_env(long in_val)
|
2005-08-14 06:22:11 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
2005-08-14 06:22:11 +04:00
|
|
|
}
|
2005-12-15 23:41:03 +03:00
|
|
|
|
2006-11-24 23:46:45 +03:00
|
|
|
/******************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2016-10-17 09:14:06 +03:00
|
|
|
auth_check_pwd_chg(const char *user)
|
2006-11-24 23:46:45 +03:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
struct passwd *spw;
|
|
|
|
struct spwd *stp;
|
|
|
|
int now;
|
|
|
|
long today;
|
|
|
|
|
|
|
|
spw = getpwnam(user);
|
|
|
|
|
|
|
|
if (spw == 0)
|
|
|
|
{
|
|
|
|
return AUTH_PWD_CHG_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (g_strncmp(spw->pw_passwd, "x", 3) != 0)
|
|
|
|
{
|
|
|
|
/* old system with only passwd */
|
|
|
|
return AUTH_PWD_CHG_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* the system is using shadow */
|
|
|
|
stp = getspnam(user);
|
|
|
|
|
|
|
|
if (stp == 0)
|
|
|
|
{
|
|
|
|
return AUTH_PWD_CHG_ERROR;
|
|
|
|
}
|
2007-04-07 20:20:08 +04:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
/* check if we need a pwd change */
|
|
|
|
now = g_time1();
|
|
|
|
today = now / SECS_PER_DAY;
|
2007-04-07 20:20:08 +04:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
if (stp->sp_expire == -1)
|
|
|
|
{
|
|
|
|
return AUTH_PWD_CHG_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (today >= (stp->sp_lstchg + stp->sp_max - stp->sp_warn))
|
|
|
|
{
|
|
|
|
return AUTH_PWD_CHG_CHANGE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (today >= (stp->sp_lstchg + stp->sp_max))
|
|
|
|
{
|
|
|
|
return AUTH_PWD_CHG_CHANGE_MANDATORY;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (today < ((stp->sp_lstchg) + (stp->sp_min)))
|
|
|
|
{
|
|
|
|
/* cannot change pwd for now */
|
|
|
|
return AUTH_PWD_CHG_NOT_NOW;
|
|
|
|
}
|
2007-04-07 20:20:08 +04:00
|
|
|
|
2009-07-23 23:59:01 +04:00
|
|
|
return AUTH_PWD_CHG_OK;
|
2007-04-07 20:20:08 +04:00
|
|
|
}
|
|
|
|
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2016-10-17 09:14:06 +03:00
|
|
|
auth_change_pwd(const char *user, const char *newpwd)
|
2007-04-07 20:20:08 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
struct passwd *spw;
|
|
|
|
struct spwd *stp;
|
|
|
|
char hash[35] = "";
|
|
|
|
long today;
|
2007-04-07 20:20:08 +04:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
FILE *fd;
|
2007-04-07 20:20:08 +04:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
if (0 != lckpwdf())
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
2007-04-07 20:20:08 +04:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
/* open passwd */
|
|
|
|
spw = getpwnam(user);
|
2007-04-07 20:20:08 +04:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
if (spw == 0)
|
2007-04-07 20:20:08 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
return 1;
|
2007-04-07 20:20:08 +04:00
|
|
|
}
|
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
if (g_strncmp(spw->pw_passwd, "x", 3) != 0)
|
2007-04-07 20:20:08 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
/* old system with only passwd */
|
|
|
|
if (auth_crypt_pwd(spw->pw_passwd, newpwd, hash) != 0)
|
|
|
|
{
|
|
|
|
ulckpwdf();
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
spw->pw_passwd = g_strdup(hash);
|
|
|
|
fd = fopen("/etc/passwd", "rw");
|
|
|
|
putpwent(spw, fd);
|
2007-04-07 20:20:08 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
else
|
2007-04-07 20:20:08 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
/* the system is using shadow */
|
|
|
|
stp = getspnam(user);
|
|
|
|
|
|
|
|
if (stp == 0)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* old system with only passwd */
|
|
|
|
if (auth_crypt_pwd(stp->sp_pwdp, newpwd, hash) != 0)
|
|
|
|
{
|
|
|
|
ulckpwdf();
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
stp->sp_pwdp = g_strdup(hash);
|
|
|
|
today = g_time1() / SECS_PER_DAY;
|
|
|
|
stp->sp_lstchg = today;
|
|
|
|
stp->sp_expire = today + stp->sp_max + stp->sp_inact;
|
|
|
|
fd = fopen("/etc/shadow", "rw");
|
|
|
|
putspent(stp, fd);
|
2007-04-07 20:20:08 +04:00
|
|
|
}
|
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
ulckpwdf();
|
|
|
|
return 0;
|
2007-04-07 20:20:08 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @brief Password encryption
|
|
|
|
* @param pwd Old password
|
|
|
|
* @param pln Plaintext new password
|
|
|
|
* @param crp Crypted new password
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2017-03-12 19:35:00 +03:00
|
|
|
static int
|
2016-11-07 07:01:49 +03:00
|
|
|
auth_crypt_pwd(const char *pwd, const char *pln, char *crp)
|
2007-04-07 20:20:08 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
char salt[13] = "$1$";
|
|
|
|
int saltcnt = 0;
|
|
|
|
char *encr;
|
|
|
|
|
|
|
|
if (g_strncmp(pwd, "$1$", 3) == 0)
|
|
|
|
{
|
|
|
|
/* gnu style crypt(); */
|
|
|
|
saltcnt = 3;
|
|
|
|
|
|
|
|
while ((pwd[saltcnt] != '$') && (saltcnt < 11))
|
|
|
|
{
|
|
|
|
salt[saltcnt] = pwd[saltcnt];
|
|
|
|
saltcnt++;
|
|
|
|
}
|
|
|
|
|
|
|
|
salt[saltcnt] = '$';
|
|
|
|
salt[saltcnt + 1] = '\0';
|
|
|
|
}
|
|
|
|
else
|
2007-04-07 20:20:08 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
/* classic two char salt */
|
|
|
|
salt[0] = pwd[0];
|
|
|
|
salt[1] = pwd[1];
|
|
|
|
salt[2] = '\0';
|
2007-04-07 20:20:08 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
|
|
|
encr = crypt(pln, salt);
|
|
|
|
g_strncpy(crp, encr, 34);
|
|
|
|
|
|
|
|
return 0;
|
2006-11-24 23:46:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @return 1 if the account is disabled, 0 otherwise
|
2007-04-07 20:20:08 +04:00
|
|
|
*
|
2006-11-24 23:46:45 +03:00
|
|
|
*/
|
2017-03-12 19:35:00 +03:00
|
|
|
static int
|
2012-09-20 07:51:34 +04:00
|
|
|
auth_account_disabled(struct spwd *stp)
|
2006-11-24 23:46:45 +03:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
int today;
|
2006-11-24 23:46:45 +03:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
if (0 == stp)
|
|
|
|
{
|
|
|
|
/* if an invalid struct was passed we assume a disabled account */
|
|
|
|
return 1;
|
|
|
|
}
|
2007-04-07 20:20:08 +04:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
today = g_time1() / SECS_PER_DAY;
|
2006-11-24 23:46:45 +03:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
LOG_DBG("last %d", stp->sp_lstchg);
|
|
|
|
LOG_DBG("min %d", stp->sp_min);
|
|
|
|
LOG_DBG("max %d", stp->sp_max);
|
|
|
|
LOG_DBG("inact %d", stp->sp_inact);
|
|
|
|
LOG_DBG("warn %d", stp->sp_warn);
|
|
|
|
LOG_DBG("expire %d", stp->sp_expire);
|
|
|
|
LOG_DBG("today %d", today);
|
2006-11-24 23:46:45 +03:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
if ((stp->sp_expire != -1) && (today >= stp->sp_expire))
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
2007-04-07 20:20:08 +04:00
|
|
|
|
2015-02-18 20:32:12 +03:00
|
|
|
if ((stp->sp_max >= 0) &&
|
|
|
|
(stp->sp_inact >= 0) &&
|
|
|
|
(stp->sp_lstchg > 0) &&
|
|
|
|
(today >= (stp->sp_lstchg + stp->sp_max + stp->sp_inact)))
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
2006-11-24 23:46:45 +03:00
|
|
|
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
2006-11-24 23:46:45 +03:00
|
|
|
}
|