1999-10-27 03:42:43 +00:00
|
|
|
/*
|
1999-11-24 13:26:21 +00:00
|
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
|
|
* All rights reserved
|
|
|
|
* Code for uid-swapping.
|
2000-09-16 02:29:08 +00:00
|
|
|
*
|
|
|
|
* As far as I am concerned, the code I have written for this software
|
|
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
|
|
* software must be clearly marked as such, and if the derived work is
|
|
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
|
|
* called by a name other than "ssh" or "Secure Shell".
|
1999-11-24 13:26:21 +00:00
|
|
|
*/
|
1999-10-27 03:42:43 +00:00
|
|
|
|
|
|
|
#include "includes.h"
|
2000-09-16 02:29:08 +00:00
|
|
|
RCSID("$OpenBSD: uidswap.c,v 1.9 2000/09/07 20:27:55 deraadt Exp $");
|
1999-10-27 03:42:43 +00:00
|
|
|
|
|
|
|
#include "ssh.h"
|
|
|
|
#include "uidswap.h"
|
2000-06-27 22:22:29 +00:00
|
|
|
#ifdef WITH_IRIX_AUDIT
|
|
|
|
#include <sat.h>
|
|
|
|
#endif /* WITH_IRIX_AUDIT */
|
1999-10-27 03:42:43 +00:00
|
|
|
|
1999-11-24 13:26:21 +00:00
|
|
|
/*
|
|
|
|
* Note: all these functions must work in all of the following cases:
|
|
|
|
* 1. euid=0, ruid=0
|
|
|
|
* 2. euid=0, ruid!=0
|
|
|
|
* 3. euid!=0, ruid!=0
|
|
|
|
* Additionally, they must work regardless of whether the system has
|
|
|
|
* POSIX saved uids or not.
|
|
|
|
*/
|
1999-10-27 03:42:43 +00:00
|
|
|
|
|
|
|
#ifdef _POSIX_SAVED_IDS
|
|
|
|
/* Lets assume that posix saved ids also work with seteuid, even though that
|
|
|
|
is not part of the posix specification. */
|
|
|
|
#define SAVED_IDS_WORK_WITH_SETEUID
|
|
|
|
|
|
|
|
/* Saved effective uid. */
|
|
|
|
static uid_t saved_euid = 0;
|
|
|
|
|
2000-01-20 13:18:15 +00:00
|
|
|
#endif /* _POSIX_SAVED_IDS */
|
|
|
|
|
1999-11-24 13:26:21 +00:00
|
|
|
/*
|
|
|
|
* Temporarily changes to the given uid. If the effective user
|
|
|
|
* id is not root, this does nothing. This call cannot be nested.
|
|
|
|
*/
|
2000-04-16 01:18:38 +00:00
|
|
|
void
|
1999-11-24 13:26:21 +00:00
|
|
|
temporarily_use_uid(uid_t uid)
|
1999-10-27 03:42:43 +00:00
|
|
|
{
|
|
|
|
#ifdef SAVED_IDS_WORK_WITH_SETEUID
|
1999-11-24 13:26:21 +00:00
|
|
|
/* Save the current euid. */
|
|
|
|
saved_euid = geteuid();
|
1999-10-27 03:42:43 +00:00
|
|
|
|
1999-11-24 13:26:21 +00:00
|
|
|
/* Set the effective uid to the given (unprivileged) uid. */
|
|
|
|
if (seteuid(uid) == -1)
|
2000-08-29 00:33:50 +00:00
|
|
|
debug("seteuid %u: %.100s", (u_int) uid, strerror(errno));
|
1999-10-27 03:42:43 +00:00
|
|
|
#else /* SAVED_IDS_WORK_WITH_SETUID */
|
1999-11-24 13:26:21 +00:00
|
|
|
/* Propagate the privileged uid to all of our uids. */
|
|
|
|
if (setuid(geteuid()) < 0)
|
2000-08-29 00:33:50 +00:00
|
|
|
debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno));
|
1999-10-27 03:42:43 +00:00
|
|
|
|
1999-11-24 13:26:21 +00:00
|
|
|
/* Set the effective uid to the given (unprivileged) uid. */
|
|
|
|
if (seteuid(uid) == -1)
|
2000-08-29 00:33:50 +00:00
|
|
|
debug("seteuid %u: %.100s", (u_int) uid, strerror(errno));
|
1999-10-27 03:42:43 +00:00
|
|
|
#endif /* SAVED_IDS_WORK_WITH_SETEUID */
|
|
|
|
}
|
|
|
|
|
1999-11-24 13:26:21 +00:00
|
|
|
/*
|
|
|
|
* Restores to the original uid.
|
|
|
|
*/
|
2000-04-16 01:18:38 +00:00
|
|
|
void
|
1999-11-24 13:26:21 +00:00
|
|
|
restore_uid()
|
1999-10-27 03:42:43 +00:00
|
|
|
{
|
|
|
|
#ifdef SAVED_IDS_WORK_WITH_SETEUID
|
1999-11-24 13:26:21 +00:00
|
|
|
/* Set the effective uid back to the saved uid. */
|
|
|
|
if (seteuid(saved_euid) < 0)
|
2000-08-29 00:33:50 +00:00
|
|
|
debug("seteuid %u: %.100s", (u_int) saved_euid, strerror(errno));
|
1999-10-27 03:42:43 +00:00
|
|
|
#else /* SAVED_IDS_WORK_WITH_SETEUID */
|
1999-11-25 00:54:57 +00:00
|
|
|
/*
|
|
|
|
* We are unable to restore the real uid to its unprivileged value.
|
|
|
|
* Propagate the real uid (usually more privileged) to effective uid
|
|
|
|
* as well.
|
|
|
|
*/
|
1999-11-24 13:26:21 +00:00
|
|
|
setuid(getuid());
|
1999-10-27 03:42:43 +00:00
|
|
|
#endif /* SAVED_IDS_WORK_WITH_SETEUID */
|
|
|
|
}
|
|
|
|
|
1999-11-24 13:26:21 +00:00
|
|
|
/*
|
|
|
|
* Permanently sets all uids to the given uid. This cannot be
|
|
|
|
* called while temporarily_use_uid is effective.
|
|
|
|
*/
|
2000-04-16 01:18:38 +00:00
|
|
|
void
|
1999-11-24 13:26:21 +00:00
|
|
|
permanently_set_uid(uid_t uid)
|
1999-10-27 03:42:43 +00:00
|
|
|
{
|
2000-06-27 22:22:29 +00:00
|
|
|
#ifdef WITH_IRIX_AUDIT
|
|
|
|
if (sysconf(_SC_AUDIT)) {
|
|
|
|
debug("Setting sat id to %d", (int) uid);
|
|
|
|
if (satsetid(uid))
|
2000-08-15 00:08:00 +00:00
|
|
|
debug("error setting satid: %.100s", strerror(errno));
|
2000-06-27 22:22:29 +00:00
|
|
|
}
|
|
|
|
#endif /* WITH_IRIX_AUDIT */
|
|
|
|
|
1999-11-24 13:26:21 +00:00
|
|
|
if (setuid(uid) < 0)
|
2000-08-29 00:33:50 +00:00
|
|
|
debug("setuid %u: %.100s", (u_int) uid, strerror(errno));
|
1999-10-27 03:42:43 +00:00
|
|
|
}
|