login_token.c revision 1.12
1/*	$OpenBSD: login_token.c,v 1.12 2015/10/15 20:14:23 bluhm Exp $	*/
2
3/*-
4 * Copyright (c) 1995, 1996 Berkeley Software Design, Inc. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 *    notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 *    notice, this list of conditions and the following disclaimer in the
13 *    documentation and/or other materials provided with the distribution.
14 * 3. All advertising materials mentioning features or use of this software
15 *    must display the following acknowledgement:
16 *      This product includes software developed by Berkeley Software Design,
17 *      Inc.
18 * 4. The name of Berkeley Software Design, Inc.  may not be used to endorse
19 *    or promote products derived from this software without specific prior
20 *    written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN, INC. ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED.  IN NO EVENT SHALL BERKELEY SOFTWARE DESIGN, INC. BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
33 *
34 *	BSDI $From: login_token.c,v 1.2 1996/09/04 05:33:05 prb Exp $
35 */
36
37#include <sys/types.h>
38#include <sys/time.h>
39#include <sys/resource.h>
40
41#include <err.h>
42#include <readpassphrase.h>
43#include <signal.h>
44#include <stdlib.h>
45#include <stdio.h>
46#include <syslog.h>
47#include <limits.h>
48#include <string.h>
49#include <unistd.h>
50#include <login_cap.h>
51#include <bsd_auth.h>
52
53#include "token.h"
54
55int
56main(int argc, char *argv[])
57{
58	FILE *back = NULL;
59	char *username = 0;
60	char *instance;
61	char challenge[1024];
62	char response[1024];
63	char *pp = 0;
64	int c;
65	int mode = 0;
66	struct rlimit cds;
67	sigset_t blockset;
68
69	(void)setpriority(PRIO_PROCESS, 0, 0);
70
71	/* We block keyboard-generated signals during database accesses. */
72	sigemptyset(&blockset);
73	sigaddset(&blockset, SIGINT);
74	sigaddset(&blockset, SIGQUIT);
75	sigaddset(&blockset, SIGTSTP);
76
77	openlog(NULL, LOG_ODELAY, LOG_AUTH);
78
79	cds.rlim_cur = 0;
80	cds.rlim_max = 0;
81	if (setrlimit(RLIMIT_CORE, &cds) < 0)
82		syslog(LOG_ERR, "couldn't set core dump size to 0: %m");
83
84	if (pledge("stdio rpath wpath cpath fattr getpw tty", NULL) == -1)
85		err(1, "pledge");
86
87	(void)sigprocmask(SIG_BLOCK, &blockset, NULL);
88	if (token_init(argv[0]) < 0) {
89		syslog(LOG_ERR, "unknown token type");
90		errx(1, "unknown token type");
91	}
92	(void)sigprocmask(SIG_UNBLOCK, &blockset, NULL);
93
94	while ((c = getopt(argc, argv, "ds:v:")) != -1)
95		switch (c) {
96		case 'd':		/* to remain undocumented */
97			back = stdout;
98			break;
99		case 'v':
100			break;
101		case 's':	/* service */
102			if (strcmp(optarg, "login") == 0)
103				mode = 0;
104			else if (strcmp(optarg, "challenge") == 0)
105				mode = 1;
106			else if (strcmp(optarg, "response") == 0)
107				mode = 2;
108			else {
109				syslog(LOG_ERR, "%s: invalid service", optarg);
110				exit(1);
111			}
112			break;
113		default:
114			syslog(LOG_ERR, "usage error");
115			exit(1);
116		}
117
118	switch (argc - optind) {
119	case 2:
120	case 1:
121		username = argv[optind];
122		break;
123	default:
124		syslog(LOG_ERR, "usage error");
125		exit(1);
126	}
127
128
129	if (back == NULL && (back = fdopen(3, "r+")) == NULL)  {
130		syslog(LOG_ERR, "reopening back channel");
131		exit(1);
132	}
133	if (mode == 2) {
134		mode = 0;
135		c = -1;
136		while (++c < sizeof(challenge) &&
137		    read(3, &challenge[c], 1) == 1) {
138			if (challenge[c] == '\0' && ++mode == 2)
139				break;
140			if (challenge[c] == '\0' && mode == 1)
141				pp = challenge + c + 1;
142		}
143		if (mode < 2) {
144			syslog(LOG_ERR, "protocol error on back channel");
145			exit(1);
146		}
147	} else {
148		(void)sigprocmask(SIG_BLOCK, &blockset, NULL);
149		tokenchallenge(username, challenge, sizeof(challenge),
150		    tt->proper);
151		(void)sigprocmask(SIG_UNBLOCK, &blockset, NULL);
152		if (mode == 1) {
153			fprintf(back, BI_VALUE " challenge %s\n",
154			    auth_mkvalue(challenge));
155			fprintf(back, BI_CHALLENGE "\n");
156			exit(0);
157		}
158
159		pp = readpassphrase(challenge, response, sizeof(response), 0);
160		if (pp == NULL)
161			exit(1);
162		if (*pp == '\0') {
163			char buf[64];
164			snprintf(buf, sizeof(buf), "%s Response [echo on]: ",
165			    tt->proper);
166			pp = readpassphrase(buf, response, sizeof(response),
167			    RPP_ECHO_ON);
168			if (pp == NULL)
169				exit(1);
170		}
171	}
172
173	(void)sigprocmask(SIG_BLOCK, &blockset, NULL);
174	if (tokenverify(username, challenge, pp) == 0) {
175		fprintf(back, BI_AUTH "\n");
176
177		if ((instance = strchr(username, '.'))) {
178			*instance++ = 0;
179			if (strcmp(instance, "root") == 0)
180				fprintf(back, BI_ROOTOKAY "\n");
181		}
182		fprintf(back, BI_SECURE "\n");
183		exit(0);
184	}
185
186	fprintf(back, BI_REJECT "\n");
187	exit(1);
188}
189