From: Duncaen Date: Wed, 30 Jan 2019 21:28:22 +0000 (+0100) Subject: doas: remove unnecessary configure checks, move shadow to its own file X-Git-Tag: v6.6~36 X-Git-Url: https://git.armaanb.net/?p=opendoas.git;a=commitdiff_plain;h=3df794793ea3db2a6a8abfeb46803b9c5b80502a doas: remove unnecessary configure checks, move shadow to its own file --- diff --git a/configure b/configure index 95d8a56..1266444 100755 --- a/configure +++ b/configure @@ -148,20 +148,6 @@ check_func() { } authmethod() { - # - # Check for bsd_auth.h. - # - src=' -#include -int main(void) { - return 0; -}' - check_func "bsd_auth_h" "$src" && { - have_bsd_auth_h=1 - printf 'bsd\n' - return 0 - } - # # Check for pam_appl.h. # @@ -173,6 +159,7 @@ int main(void) { [ -z "$WITHOUT_PAM" ] && check_func "pam_appl_h" "$src" && { printf 'SRCS += pam.c\n' >>$CONFIG_MK printf 'LDFLAGS += -lpam\n' >>$CONFIG_MK + printf 'CPPFLAGS += -DUSE_PAM\n' >>$CONFIG_MK printf 'pam\n' return 0 } @@ -186,7 +173,9 @@ int main(void) { return 0; }' [ -z "$WITHOUT_SHADOW" ] && check_func "shadow_h" "$src" && { + printf 'SRCS += shadow.c\n' >>$CONFIG_MK printf 'LDFLAGS += -lcrypt\n' >>$CONFIG_MK + printf 'CPPFLAGS += -DUSE_SHADOW\n' >>$CONFIG_MK printf 'shadow\n' return 0 } @@ -354,19 +343,6 @@ check_func "setresuid" "$src" || { printf 'OPENBSD += setresuid.o\n' >>$CONFIG_MK } -# -# Check for pledge(). -# -src=' -#include -int main(void) { - pledge("", NULL); - return 0; -}' -check_func "pledge" "$src" || { - printf 'OPENBSD += pledge-noop.o\n' >>$CONFIG_MK -} - # # Check for closefrom(). # diff --git a/doas.c b/doas.c index cee1aec..2bdaac2 100644 --- a/doas.c +++ b/doas.c @@ -20,6 +20,10 @@ #include #include +#if __OpenBSD__ +# include +# include +#endif #include #include #include @@ -29,9 +33,6 @@ #include #include #include -#if HAVE_SHADOW_H -#include -#endif #include "includes.h" @@ -41,7 +42,7 @@ static void __dead usage(void) { fprintf(stderr, "usage: doas [-Lns] " -#ifdef HAVE_BSD_AUTH_H +#ifdef __OpenBSD__ "[-a style] " #endif "[-C config] [-u user] command [args]\n"); @@ -199,7 +200,7 @@ checkconfig(const char *confpath, int argc, char **argv, } } -#ifdef HAVE_BSD_AUTH_H +#ifdef USE_BSD_AUTH static void authuser(char *myname, char *login_style, int persist) { @@ -245,69 +246,7 @@ good: close(fd); } } -#elif HAVE_SHADOW_H -static void -authuser(const char *myname, const char *login_style, int persist) -{ - const char *hash; - char *encrypted; - struct passwd *pw; - - (void)login_style; - -#ifdef PERSIST_TIMESTAMP - int fd = -1; - int valid; - if (persist) - fd = persist_open(&valid, 5 * 60); - if (fd != -1 && valid) - goto good; -#else - (void)persist; -#endif - - if (!(pw = getpwnam(myname))) - err(1, "getpwnam"); - - hash = pw->pw_passwd; - if (hash[0] == 'x' && hash[1] == '\0') { - struct spwd *sp; - if (!(sp = getspnam(myname))) - errx(1, "Authorization failed"); - hash = sp->sp_pwdp; - } else if (hash[0] != '*') { - errx(1, "Authorization failed"); - } - - char *challenge, *response, rbuf[1024], cbuf[128], host[HOST_NAME_MAX + 1]; - if (gethostname(host, sizeof(host))) - snprintf(host, sizeof(host), "?"); - snprintf(cbuf, sizeof(cbuf), - "\rdoas (%.32s@%.32s) password: ", myname, host); - challenge = cbuf; - - response = readpassphrase(challenge, rbuf, sizeof(rbuf), RPP_REQUIRE_TTY); - if (response == NULL && errno == ENOTTY) { - syslog(LOG_AUTHPRIV | LOG_NOTICE, - "tty required for %s", myname); - errx(1, "a tty is required"); - } - if (!(encrypted = crypt(response, hash))) - errx(1, "crypt"); - if (strcmp(encrypted, hash) != 0) { - syslog(LOG_AUTHPRIV | LOG_NOTICE, "failed auth for %s", myname); - errx(1, "Authorization failed"); - } - explicit_bzero(rbuf, sizeof(rbuf)); -#ifdef PERSIST_TIMESTAMP -good: - if (fd != -1) { - persist_set(fd, 5 * 60); - close(fd); - } #endif -} -#endif /* HAVE_BSD_AUTH_H */ int main(int argc, char **argv) @@ -332,7 +271,7 @@ main(int argc, char **argv) char cwdpath[PATH_MAX]; const char *cwd; char **envp; -#ifdef HAVE_BSD_AUTH_H +#ifdef USE_BSD_AUTH char *login_style = NULL; #endif @@ -342,15 +281,15 @@ main(int argc, char **argv) uid = getuid(); -#ifdef HAVE_BSD_AUTH_H -# define OPTSTRING "a:C:Lnsu:v" +#ifdef USE_BSD_AUTH +# define OPTSTRING "a:C:Lnsu:" #else -# define OPTSTRING "+C:Lnsu:v" +# define OPTSTRING "+C:Lnsu:" #endif while ((ch = getopt(argc, argv, OPTSTRING)) != -1) { switch (ch) { -#ifdef HAVE_BSD_AUTH_H +#ifdef USE_BSD_AUTH case 'a': login_style = optarg; break; @@ -441,57 +380,78 @@ main(int argc, char **argv) errc(1, EPERM, NULL); } -#if defined(HAVE_BSD_AUTH_H) || defined(HAVE_SHADOW_H) +#if defined(__OpenBSD__) if (!(rule->options & NOPASS)) { if (nflag) errx(1, "Authorization required"); authuser(myname, login_style, rule->options & PERSIST); } -#elif HAVE_PAM_APPL_H + + if (pledge("stdio rpath getpw exec id", NULL) == -1) + err(1, "pledge"); + pw = getpwuid(target); if (!pw) errx(1, "no passwd entry for target"); - if (!pamauth(pw->pw_name, myname, !nflag, rule->options & NOPASS)) { - syslog(LOG_AUTHPRIV | LOG_NOTICE, "failed auth for %s", myname); - errx(1, "Authorization failed"); +#elif defined(USE_SHADOW) + if (!(rule->options & NOPASS)) { + if (nflag) + errx(1, "Authorization required"); + + shadowauth(myname, rule->options & PERSIST); } -#else -#error "No authentication method" -#endif /* HAVE_BSD_AUTH_H */ - if (pledge("stdio rpath getpw exec id", NULL) == -1) - err(1, "pledge"); + pw = getpwuid(target); + if (!pw) + errx(1, "no passwd entry for target"); +#elif defined(USE_PAM) pw = getpwuid(target); if (!pw) errx(1, "no passwd entry for target"); -#ifdef HAVE_BSD_AUTH_H + if (!pamauth(pw->pw_name, myname, !nflag, rule->options & NOPASS)) { + syslog(LOG_AUTHPRIV | LOG_NOTICE, "failed auth for %s", myname); + errx(1, "Authorization failed"); + } + +#else + (void) nflag; + if (!(rule->options & NOPASS)) { + errx(1, "Authorization required"); + } +#endif + +#ifdef HAVE_SETUSERCONTEXT if (setusercontext(NULL, pw, target, LOGIN_SETGROUP | LOGIN_SETPRIORITY | LOGIN_SETRESOURCES | LOGIN_SETUMASK | LOGIN_SETUSER) != 0) errx(1, "failed to set user context for target"); #else if (setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) != 0) - errx(1, "setresgid"); + err(1, "setresgid"); if (initgroups(pw->pw_name, pw->pw_gid) != 0) - errx(1, "initgroups"); + err(1, "initgroups"); if (setresuid(target, target, target) != 0) - errx(1, "setresuid"); + err(1, "setresuid"); #endif +#ifdef __OpenBSD__ if (pledge("stdio rpath exec", NULL) == -1) err(1, "pledge"); +#endif if (getcwd(cwdpath, sizeof(cwdpath)) == NULL) cwd = "(failed)"; else cwd = cwdpath; +#ifdef __OpenBSD__ if (pledge("stdio exec", NULL) == -1) err(1, "pledge"); +#endif syslog(LOG_AUTHPRIV | LOG_INFO, "%s ran command %s as %s from %s", myname, cmdline, pw->pw_name, cwd); diff --git a/includes.h b/includes.h index dd4bc63..7083674 100644 --- a/includes.h +++ b/includes.h @@ -13,16 +13,17 @@ # define _PATH_TTY "/dev/tty" #endif -#ifdef HAVE_READPASSPHRASE_H -# include -#endif #include "openbsd.h" -#ifdef HAVE_PAM_APPL_H +#ifdef USE_PAM int pamauth(const char *, const char *, int, int); #endif +#ifdef USE_SHADOW +void shadowauth(const char *, int); +#endif + #ifdef PERSIST_TIMESTAMP int persist_open(int *, int); int persist_set(int, int); diff --git a/pam.c b/pam.c index 3e8fab5..6be44b7 100644 --- a/pam.c +++ b/pam.c @@ -15,22 +15,25 @@ */ #include + #include #include +#include #include +#ifdef HAVE_READPASSPHRASE_H +# include +#else +# include "readpassphrase.h" +#endif +#include #include #include #include -#include #include -#include -#ifdef __linux__ -#include -#endif +#include #include -#include "doas.h" #include "includes.h" #define PAM_SERVICE_NAME "doas" diff --git a/shadow.c b/shadow.c new file mode 100644 index 0000000..a775b2b --- /dev/null +++ b/shadow.c @@ -0,0 +1,83 @@ +#if HAVE_CRYPT_H +# include +#endif +#include +#include +#include +#include +#ifdef HAVE_READPASSPHRASE_H +# include +#else +# include "readpassphrase.h" +#endif +#include +#include +#include +#include +#include + +#include "openbsd.h" + +void +shadowauth(const char *myname, int persist) +{ + const char *hash; + char *encrypted; + struct passwd *pw; + char *challenge, *response, rbuf[1024], cbuf[128]; + +#ifdef USE_TIMESTAMP + int fd = -1; + int valid = 0; + + if (persist) + fd = timestamp_open(&valid, 5 * 60); + if (fd != -1 && valid == 1) + goto good; +#else + (void) persist; +#endif + + if ((pw = getpwnam(myname)) == NULL) + err(1, "getpwnam"); + + hash = pw->pw_passwd; + if (hash[0] == 'x' && hash[1] == '\0') { + struct spwd *sp; + if ((sp = getspnam(myname)) == NULL) + errx(1, "Authorization failed"); + hash = sp->sp_pwdp; + } else if (hash[0] != '*') { + errx(1, "Authorization failed"); + } + + char host[HOST_NAME_MAX + 1]; + if (gethostname(host, sizeof(host))) + snprintf(host, sizeof(host), "?"); + snprintf(cbuf, sizeof(cbuf), + "\rdoas (%.32s@%.32s) password: ", myname, host); + challenge = cbuf; + + response = readpassphrase(challenge, rbuf, sizeof(rbuf), RPP_REQUIRE_TTY); + if (response == NULL && errno == ENOTTY) { + syslog(LOG_AUTHPRIV | LOG_NOTICE, + "tty required for %s", myname); + errx(1, "a tty is required"); + } + if ((encrypted = crypt(response, hash)) == NULL) + err(1, "crypt"); + if (strcmp(encrypted, hash) != 0) { + syslog(LOG_AUTHPRIV | LOG_NOTICE, "failed auth for %s", myname); + errx(1, "Authorization failed"); + } + + explicit_bzero(rbuf, sizeof(rbuf)); + +#ifdef USE_TIMESTAMP +good: + if (fd != -1) { + timestamp_set(fd, 5 * 60); + close(fd); + } +#endif +}