2012-09-20 07:51:34 +04:00
|
|
|
/**
|
|
|
|
* xrdp: A Remote Desktop Protocol server.
|
|
|
|
*
|
2015-12-12 07:41:17 +03:00
|
|
|
* Copyright (C) Jay Sorg 2004-2015
|
2012-09-20 07:51:34 +04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
2005-12-15 23:41:03 +03:00
|
|
|
|
2006-05-26 00:34:32 +04:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @file access.c
|
|
|
|
* @brief User access control code
|
|
|
|
* @author Simone Fedele
|
2008-07-30 14:58:30 +04:00
|
|
|
*
|
2006-05-26 00:34:32 +04:00
|
|
|
*/
|
|
|
|
|
2017-03-03 07:33:23 +03:00
|
|
|
#if defined(HAVE_CONFIG_H)
|
|
|
|
#include <config_ac.h>
|
|
|
|
#endif
|
|
|
|
|
2022-09-08 17:05:51 +03:00
|
|
|
#include "arch.h"
|
|
|
|
|
|
|
|
#include "access.h"
|
|
|
|
#include "config.h"
|
|
|
|
#include "log.h"
|
2005-12-15 23:41:03 +03:00
|
|
|
#include "sesman.h"
|
2022-09-08 17:05:51 +03:00
|
|
|
#include "os_calls.h"
|
2020-12-21 15:36:00 +03:00
|
|
|
#include "string_calls.h"
|
2005-12-15 23:41:03 +03:00
|
|
|
|
|
|
|
/******************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2016-10-17 09:14:06 +03:00
|
|
|
access_login_allowed(const char *user)
|
2005-12-15 23:41:03 +03:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
int gid;
|
|
|
|
int ok;
|
|
|
|
|
|
|
|
if ((0 == g_strncmp(user, "root", 5)) && (0 == g_cfg->sec.allow_root))
|
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"ROOT login attempted, but root login is disabled");
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-11-30 03:36:20 +03:00
|
|
|
if ((0 == g_cfg->sec.ts_users_enable) && (0 == g_cfg->sec.ts_always_group_check))
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "Terminal Server Users group is disabled, allowing authentication");
|
2012-09-20 07:51:34 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2022-09-08 16:00:36 +03:00
|
|
|
if (0 != g_getuser_info_by_name(user, 0, &gid, 0, 0, 0))
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR, "Cannot read user info! - login denied");
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (g_cfg->sec.ts_users == gid)
|
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_DEBUG, "ts_users is user's primary group");
|
2012-09-20 07:51:34 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (0 != g_check_user_in_group(user, g_cfg->sec.ts_users, &ok))
|
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR, "Cannot read group info! - login denied");
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ok)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "login denied for user %s", user);
|
2005-12-15 23:41:03 +03:00
|
|
|
|
|
|
|
return 0;
|
2008-07-30 14:58:30 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
int
|
2016-10-17 09:14:06 +03:00
|
|
|
access_login_mng_allowed(const char *user)
|
2008-07-30 14:58:30 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
int gid;
|
|
|
|
int ok;
|
|
|
|
|
|
|
|
if ((0 == g_strncmp(user, "root", 5)) && (0 == g_cfg->sec.allow_root))
|
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"[MNG] ROOT login attempted, but root login is disabled");
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (0 == g_cfg->sec.ts_admins_enable)
|
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "[MNG] Terminal Server Admin group is disabled, "
|
|
|
|
"allowing authentication");
|
2012-09-20 07:51:34 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2022-09-08 16:00:36 +03:00
|
|
|
if (0 != g_getuser_info_by_name(user, 0, &gid, 0, 0, 0))
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR, "[MNG] Cannot read user info! - login denied");
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (g_cfg->sec.ts_admins == gid)
|
|
|
|
{
|
2020-10-08 04:55:08 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "[MNG] ts_users is user's primary group");
|
2012-09-20 07:51:34 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (0 != g_check_user_in_group(user, g_cfg->sec.ts_admins, &ok))
|
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR, "[MNG] Cannot read group info! - login denied");
|
2012-09-20 07:51:34 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ok)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "[MNG] login denied for user %s", user);
|
2008-07-30 14:58:30 +04:00
|
|
|
|
2005-12-15 23:41:03 +03:00
|
|
|
return 0;
|
|
|
|
}
|