mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-27 20:42:07 +00:00
794f97026e
ok djm@
818 lines
20 KiB
C
818 lines
20 KiB
C
/*
|
|
* $Id: bsd-cray.c,v 1.17 2007/08/15 09:17:43 dtucker Exp $
|
|
*
|
|
* bsd-cray.c
|
|
*
|
|
* Copyright (c) 2002, Cray Inc. (Wendy Palm <wendyp@cray.com>)
|
|
* Significant portions provided by
|
|
* Wayne Schroeder, SDSC <schroeder@sdsc.edu>
|
|
* William Jones, UTexas <jones@tacc.utexas.edu>
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
* Created: Apr 22 16.34:00 2002 wp
|
|
*
|
|
* This file contains functions required for proper execution
|
|
* on UNICOS systems.
|
|
*
|
|
*/
|
|
#ifdef _UNICOS
|
|
|
|
#include <udb.h>
|
|
#include <tmpdir.h>
|
|
#include <unistd.h>
|
|
#include <sys/category.h>
|
|
#include <utmp.h>
|
|
#include <sys/jtab.h>
|
|
#include <signal.h>
|
|
#include <sys/priv.h>
|
|
#include <sys/secparm.h>
|
|
#include <sys/tfm.h>
|
|
#include <sys/usrv.h>
|
|
#include <sys/sysv.h>
|
|
#include <sys/sectab.h>
|
|
#include <sys/secstat.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/session.h>
|
|
#include <stdarg.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <pwd.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
#include <ia.h>
|
|
#include <urm.h>
|
|
#include "ssh.h"
|
|
|
|
#include "includes.h"
|
|
#include "sys/types.h"
|
|
|
|
#ifndef HAVE_STRUCT_SOCKADDR_STORAGE
|
|
# define _SS_MAXSIZE 128 /* Implementation specific max size */
|
|
# define _SS_PADSIZE (_SS_MAXSIZE - sizeof (struct sockaddr))
|
|
|
|
# define ss_family ss_sa.sa_family
|
|
#endif /* !HAVE_STRUCT_SOCKADDR_STORAGE */
|
|
|
|
#ifndef IN6_IS_ADDR_LOOPBACK
|
|
# define IN6_IS_ADDR_LOOPBACK(a) \
|
|
(((u_int32_t *) (a))[0] == 0 && ((u_int32_t *) (a))[1] == 0 && \
|
|
((u_int32_t *) (a))[2] == 0 && ((u_int32_t *) (a))[3] == htonl (1))
|
|
#endif /* !IN6_IS_ADDR_LOOPBACK */
|
|
|
|
#ifndef AF_INET6
|
|
/* Define it to something that should never appear */
|
|
#define AF_INET6 AF_MAX
|
|
#endif
|
|
|
|
#include "log.h"
|
|
#include "servconf.h"
|
|
#include "bsd-cray.h"
|
|
|
|
#define MAXACID 80
|
|
|
|
extern ServerOptions options;
|
|
|
|
char cray_tmpdir[TPATHSIZ + 1]; /* job TMPDIR path */
|
|
|
|
struct sysv sysv; /* system security structure */
|
|
struct usrv usrv; /* user security structure */
|
|
|
|
/*
|
|
* Functions.
|
|
*/
|
|
void cray_retain_utmp(struct utmp *, int);
|
|
void cray_delete_tmpdir(char *, int, uid_t);
|
|
void cray_init_job(struct passwd *);
|
|
void cray_set_tmpdir(struct utmp *);
|
|
void cray_login_failure(char *, int);
|
|
int cray_setup(uid_t, char *, const char *);
|
|
int cray_access_denied(char *);
|
|
|
|
void
|
|
cray_login_failure(char *username, int errcode)
|
|
{
|
|
struct udb *ueptr; /* UDB pointer for username */
|
|
ia_failure_t fsent; /* ia_failure structure */
|
|
ia_failure_ret_t fret; /* ia_failure return stuff */
|
|
struct jtab jtab; /* job table structure */
|
|
int jid = 0; /* job id */
|
|
|
|
if ((jid = getjtab(&jtab)) < 0)
|
|
debug("cray_login_failure(): getjtab error");
|
|
|
|
getsysudb();
|
|
if ((ueptr = getudbnam(username)) == UDB_NULL)
|
|
debug("cray_login_failure(): getudbname() returned NULL");
|
|
endudb();
|
|
|
|
memset(&fsent, '\0', sizeof(fsent));
|
|
fsent.revision = 0;
|
|
fsent.uname = username;
|
|
fsent.host = (char *)get_canonical_hostname(options.use_dns);
|
|
fsent.ttyn = "sshd";
|
|
fsent.caller = IA_SSHD;
|
|
fsent.flags = IA_INTERACTIVE;
|
|
fsent.ueptr = ueptr;
|
|
fsent.jid = jid;
|
|
fsent.errcode = errcode;
|
|
fsent.pwdp = NULL;
|
|
fsent.exitcode = 0; /* dont exit in ia_failure() */
|
|
|
|
fret.revision = 0;
|
|
fret.normal = 0;
|
|
|
|
/*
|
|
* Call ia_failure because of an login failure.
|
|
*/
|
|
ia_failure(&fsent, &fret);
|
|
}
|
|
|
|
/*
|
|
* Cray access denied
|
|
*/
|
|
int
|
|
cray_access_denied(char *username)
|
|
{
|
|
struct udb *ueptr; /* UDB pointer for username */
|
|
int errcode; /* IA errorcode */
|
|
|
|
errcode = 0;
|
|
getsysudb();
|
|
if ((ueptr = getudbnam(username)) == UDB_NULL)
|
|
debug("cray_login_failure(): getudbname() returned NULL");
|
|
endudb();
|
|
|
|
if (ueptr != NULL && ueptr->ue_disabled)
|
|
errcode = IA_DISABLED;
|
|
if (errcode)
|
|
cray_login_failure(username, errcode);
|
|
|
|
return (errcode);
|
|
}
|
|
|
|
/*
|
|
* record_failed_login: generic "login failed" interface function
|
|
*/
|
|
void
|
|
record_failed_login(const char *user, const char *hostname, const char *ttyname)
|
|
{
|
|
cray_login_failure((char *)user, IA_UDBERR);
|
|
}
|
|
|
|
int
|
|
cray_setup (uid_t uid, char *username, const char *command)
|
|
{
|
|
extern struct udb *getudb();
|
|
extern char *setlimits();
|
|
|
|
int err; /* error return */
|
|
time_t system_time; /* current system clock */
|
|
time_t expiration_time; /* password expiration time */
|
|
int maxattempts; /* maximum no. of failed login attempts */
|
|
int SecureSys; /* unicos security flag */
|
|
int minslevel = 0; /* system minimum security level */
|
|
int i, j;
|
|
int valid_acct = -1; /* flag for reading valid acct */
|
|
char acct_name[MAXACID] = { "" }; /* used to read acct name */
|
|
struct jtab jtab; /* Job table struct */
|
|
struct udb ue; /* udb entry for logging-in user */
|
|
struct udb *up; /* pointer to UDB entry */
|
|
struct secstat secinfo; /* file security attributes */
|
|
struct servprov init_info; /* used for sesscntl() call */
|
|
int jid; /* job ID */
|
|
int pid; /* process ID */
|
|
char *sr; /* status return from setlimits() */
|
|
char *ttyn = NULL; /* ttyname or command name*/
|
|
char hostname[MAXHOSTNAMELEN];
|
|
/* passwd stuff for ia_user */
|
|
passwd_t pwdacm, pwddialup, pwdudb, pwdwal, pwddce;
|
|
ia_user_ret_t uret; /* stuff returned from ia_user */
|
|
ia_user_t usent; /* ia_user main structure */
|
|
int ia_rcode; /* ia_user return code */
|
|
ia_failure_t fsent; /* ia_failure structure */
|
|
ia_failure_ret_t fret; /* ia_failure return stuff */
|
|
ia_success_t ssent; /* ia_success structure */
|
|
ia_success_ret_t sret; /* ia_success return stuff */
|
|
int ia_mlsrcode; /* ia_mlsuser return code */
|
|
int secstatrc; /* [f]secstat return code */
|
|
|
|
if (SecureSys = (int)sysconf(_SC_CRAY_SECURE_SYS)) {
|
|
getsysv(&sysv, sizeof(struct sysv));
|
|
minslevel = sysv.sy_minlvl;
|
|
if (getusrv(&usrv) < 0)
|
|
fatal("getusrv() failed, errno = %d", errno);
|
|
}
|
|
hostname[0] = '\0';
|
|
strlcpy(hostname,
|
|
(char *)get_canonical_hostname(options.use_dns),
|
|
MAXHOSTNAMELEN);
|
|
/*
|
|
* Fetch user's UDB entry.
|
|
*/
|
|
getsysudb();
|
|
if ((up = getudbnam(username)) == UDB_NULL)
|
|
fatal("cannot fetch user's UDB entry");
|
|
|
|
/*
|
|
* Prevent any possible fudging so perform a data
|
|
* safety check and compare the supplied uid against
|
|
* the udb's uid.
|
|
*/
|
|
if (up->ue_uid != uid)
|
|
fatal("IA uid missmatch");
|
|
endudb();
|
|
|
|
if ((jid = getjtab(&jtab)) < 0) {
|
|
debug("getjtab");
|
|
return(-1);
|
|
}
|
|
pid = getpid();
|
|
ttyn = ttyname(0);
|
|
if (SecureSys) {
|
|
if (ttyn != NULL)
|
|
secstatrc = secstat(ttyn, &secinfo);
|
|
else
|
|
secstatrc = fsecstat(1, &secinfo);
|
|
|
|
if (secstatrc == 0)
|
|
debug("[f]secstat() successful");
|
|
else
|
|
fatal("[f]secstat() error, rc = %d", secstatrc);
|
|
}
|
|
if ((ttyn == NULL) && ((char *)command != NULL))
|
|
ttyn = (char *)command;
|
|
/*
|
|
* Initialize all structures to call ia_user
|
|
*/
|
|
usent.revision = 0;
|
|
usent.uname = username;
|
|
usent.host = hostname;
|
|
usent.ttyn = ttyn;
|
|
usent.caller = IA_SSHD;
|
|
usent.pswdlist = &pwdacm;
|
|
usent.ueptr = &ue;
|
|
usent.flags = IA_INTERACTIVE | IA_FFLAG;
|
|
pwdacm.atype = IA_SECURID;
|
|
pwdacm.pwdp = NULL;
|
|
pwdacm.next = &pwdudb;
|
|
|
|
pwdudb.atype = IA_UDB;
|
|
pwdudb.pwdp = NULL;
|
|
pwdudb.next = &pwddce;
|
|
|
|
pwddce.atype = IA_DCE;
|
|
pwddce.pwdp = NULL;
|
|
pwddce.next = &pwddialup;
|
|
|
|
pwddialup.atype = IA_DIALUP;
|
|
pwddialup.pwdp = NULL;
|
|
/* pwddialup.next = &pwdwal; */
|
|
pwddialup.next = NULL;
|
|
|
|
pwdwal.atype = IA_WAL;
|
|
pwdwal.pwdp = NULL;
|
|
pwdwal.next = NULL;
|
|
|
|
uret.revision = 0;
|
|
uret.pswd = NULL;
|
|
uret.normal = 0;
|
|
|
|
ia_rcode = ia_user(&usent, &uret);
|
|
switch (ia_rcode) {
|
|
/*
|
|
* These are acceptable return codes from ia_user()
|
|
*/
|
|
case IA_UDBWEEK: /* Password Expires in 1 week */
|
|
expiration_time = ue.ue_pwage.time + ue.ue_pwage.maxage;
|
|
printf ("WARNING - your current password will expire %s\n",
|
|
ctime((const time_t *)&expiration_time));
|
|
break;
|
|
case IA_UDBEXPIRED:
|
|
if (ttyname(0) != NULL) {
|
|
/* Force a password change */
|
|
printf("Your password has expired; Choose a new one.\n");
|
|
execl("/bin/passwd", "passwd", username, 0);
|
|
exit(9);
|
|
}
|
|
break;
|
|
case IA_NORMAL: /* Normal Return Code */
|
|
break;
|
|
case IA_BACKDOOR:
|
|
/* XXX: can we memset it to zero here so save some of this */
|
|
strlcpy(ue.ue_name, "root", sizeof(ue.ue_name));
|
|
strlcpy(ue.ue_dir, "/", sizeof(ue.ue_dir));
|
|
strlcpy(ue.ue_shell, "/bin/sh", sizeof(ue.ue_shell));
|
|
|
|
ue.ue_passwd[0] = '\0';
|
|
ue.ue_age[0] = '\0';
|
|
ue.ue_comment[0] = '\0';
|
|
ue.ue_loghost[0] = '\0';
|
|
ue.ue_logline[0] = '\0';
|
|
|
|
ue.ue_uid = -1;
|
|
ue.ue_nice[UDBRC_INTER] = 0;
|
|
|
|
for (i = 0; i < MAXVIDS; i++)
|
|
ue.ue_gids[i] = 0;
|
|
|
|
ue.ue_logfails = 0;
|
|
ue.ue_minlvl = ue.ue_maxlvl = ue.ue_deflvl = minslevel;
|
|
ue.ue_defcomps = 0;
|
|
ue.ue_comparts = 0;
|
|
ue.ue_permits = 0;
|
|
ue.ue_trap = 0;
|
|
ue.ue_disabled = 0;
|
|
ue.ue_logtime = 0;
|
|
break;
|
|
case IA_CONSOLE: /* Superuser not from Console */
|
|
case IA_TRUSTED: /* Trusted user */
|
|
if (options.permit_root_login > PERMIT_NO)
|
|
break; /* Accept root login */
|
|
default:
|
|
/*
|
|
* These are failed return codes from ia_user()
|
|
*/
|
|
switch (ia_rcode)
|
|
{
|
|
case IA_BADAUTH:
|
|
printf("Bad authorization, access denied.\n");
|
|
break;
|
|
case IA_DISABLED:
|
|
printf("Your login has been disabled. Contact the system ");
|
|
printf("administrator for assistance.\n");
|
|
break;
|
|
case IA_GETSYSV:
|
|
printf("getsysv() failed - errno = %d\n", errno);
|
|
break;
|
|
case IA_MAXLOGS:
|
|
printf("Maximum number of failed login attempts exceeded.\n");
|
|
printf("Access denied.\n");
|
|
break;
|
|
case IA_UDBPWDNULL:
|
|
if (SecureSys)
|
|
printf("NULL Password not allowed on MLS systems.\n");
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
/*
|
|
* Authentication failed.
|
|
*/
|
|
printf("sshd: Login incorrect, (0%o)\n",
|
|
ia_rcode-IA_ERRORCODE);
|
|
|
|
/*
|
|
* Initialize structure for ia_failure
|
|
* which will exit.
|
|
*/
|
|
fsent.revision = 0;
|
|
fsent.uname = username;
|
|
fsent.host = hostname;
|
|
fsent.ttyn = ttyn;
|
|
fsent.caller = IA_SSHD;
|
|
fsent.flags = IA_INTERACTIVE;
|
|
fsent.ueptr = &ue;
|
|
fsent.jid = jid;
|
|
fsent.errcode = ia_rcode;
|
|
fsent.pwdp = uret.pswd;
|
|
fsent.exitcode = 1;
|
|
|
|
fret.revision = 0;
|
|
fret.normal = 0;
|
|
|
|
/*
|
|
* Call ia_failure because of an IA failure.
|
|
* There is no return because ia_failure exits.
|
|
*/
|
|
ia_failure(&fsent, &fret);
|
|
|
|
exit(1);
|
|
}
|
|
|
|
ia_mlsrcode = IA_NORMAL;
|
|
if (SecureSys) {
|
|
debug("calling ia_mlsuser()");
|
|
ia_mlsrcode = ia_mlsuser(&ue, &secinfo, &usrv, NULL, 0);
|
|
}
|
|
if (ia_mlsrcode != IA_NORMAL) {
|
|
printf("sshd: Login incorrect, (0%o)\n",
|
|
ia_mlsrcode-IA_ERRORCODE);
|
|
/*
|
|
* Initialize structure for ia_failure
|
|
* which will exit.
|
|
*/
|
|
fsent.revision = 0;
|
|
fsent.uname = username;
|
|
fsent.host = hostname;
|
|
fsent.ttyn = ttyn;
|
|
fsent.caller = IA_SSHD;
|
|
fsent.flags = IA_INTERACTIVE;
|
|
fsent.ueptr = &ue;
|
|
fsent.jid = jid;
|
|
fsent.errcode = ia_mlsrcode;
|
|
fsent.pwdp = uret.pswd;
|
|
fsent.exitcode = 1;
|
|
fret.revision = 0;
|
|
fret.normal = 0;
|
|
|
|
/*
|
|
* Call ia_failure because of an IA failure.
|
|
* There is no return because ia_failure exits.
|
|
*/
|
|
ia_failure(&fsent,&fret);
|
|
exit(1);
|
|
}
|
|
|
|
/* Provide login status information */
|
|
if (options.print_lastlog && ue.ue_logtime != 0) {
|
|
printf("Last successful login was : %.*s ", 19,
|
|
(char *)ctime(&ue.ue_logtime));
|
|
|
|
if (*ue.ue_loghost != '\0') {
|
|
printf("from %.*s\n", sizeof(ue.ue_loghost),
|
|
ue.ue_loghost);
|
|
} else {
|
|
printf("on %.*s\n", sizeof(ue.ue_logline),
|
|
ue.ue_logline);
|
|
}
|
|
|
|
if (SecureSys && (ue.ue_logfails != 0)) {
|
|
printf(" followed by %d failed attempts\n",
|
|
ue.ue_logfails);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Call ia_success to process successful I/A.
|
|
*/
|
|
ssent.revision = 0;
|
|
ssent.uname = username;
|
|
ssent.host = hostname;
|
|
ssent.ttyn = ttyn;
|
|
ssent.caller = IA_SSHD;
|
|
ssent.flags = IA_INTERACTIVE;
|
|
ssent.ueptr = &ue;
|
|
ssent.jid = jid;
|
|
ssent.errcode = ia_rcode;
|
|
ssent.us = NULL;
|
|
ssent.time = 1; /* Set ue_logtime */
|
|
|
|
sret.revision = 0;
|
|
sret.normal = 0;
|
|
|
|
ia_success(&ssent, &sret);
|
|
|
|
/*
|
|
* Query for account, iff > 1 valid acid & askacid permbit
|
|
*/
|
|
if (((ue.ue_permbits & PERMBITS_ACCTID) ||
|
|
(ue.ue_acids[0] >= 0) && (ue.ue_acids[1] >= 0)) &&
|
|
ue.ue_permbits & PERMBITS_ASKACID) {
|
|
if (ttyname(0) != NULL) {
|
|
debug("cray_setup: ttyname true case, %.100s", ttyname);
|
|
while (valid_acct == -1) {
|
|
printf("Account (? for available accounts)"
|
|
" [%s]: ", acid2nam(ue.ue_acids[0]));
|
|
fgets(acct_name, MAXACID, stdin);
|
|
switch (acct_name[0]) {
|
|
case EOF:
|
|
exit(0);
|
|
break;
|
|
case '\0':
|
|
valid_acct = ue.ue_acids[0];
|
|
strlcpy(acct_name, acid2nam(valid_acct), MAXACID);
|
|
break;
|
|
case '?':
|
|
/* Print the list 3 wide */
|
|
for (i = 0, j = 0; i < MAXVIDS; i++) {
|
|
if (ue.ue_acids[i] == -1) {
|
|
printf("\n");
|
|
break;
|
|
}
|
|
if (++j == 4) {
|
|
j = 1;
|
|
printf("\n");
|
|
}
|
|
printf(" %s",
|
|
acid2nam(ue.ue_acids[i]));
|
|
}
|
|
if (ue.ue_permbits & PERMBITS_ACCTID) {
|
|
printf("\"acctid\" permbit also allows"
|
|
" you to select any valid "
|
|
"account name.\n");
|
|
}
|
|
printf("\n");
|
|
break;
|
|
default:
|
|
valid_acct = nam2acid(acct_name);
|
|
if (valid_acct == -1)
|
|
printf(
|
|
"Account id not found for"
|
|
" account name \"%s\"\n\n",
|
|
acct_name);
|
|
break;
|
|
}
|
|
/*
|
|
* If an account was given, search the user's
|
|
* acids array to verify they can use this account.
|
|
*/
|
|
if ((valid_acct != -1) &&
|
|
!(ue.ue_permbits & PERMBITS_ACCTID)) {
|
|
for (i = 0; i < MAXVIDS; i++) {
|
|
if (ue.ue_acids[i] == -1)
|
|
break;
|
|
if (valid_acct == ue.ue_acids[i])
|
|
break;
|
|
}
|
|
if (i == MAXVIDS ||
|
|
ue.ue_acids[i] == -1) {
|
|
fprintf(stderr, "Cannot set"
|
|
" account name to "
|
|
"\"%s\", permission "
|
|
"denied\n\n", acct_name);
|
|
valid_acct = -1;
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
/*
|
|
* The client isn't connected to a terminal and can't
|
|
* respond to an acid prompt. Use default acid.
|
|
*/
|
|
debug("cray_setup: ttyname false case, %.100s",
|
|
ttyname);
|
|
valid_acct = ue.ue_acids[0];
|
|
}
|
|
} else {
|
|
/*
|
|
* The user doesn't have the askacid permbit set or
|
|
* only has one valid account to use.
|
|
*/
|
|
valid_acct = ue.ue_acids[0];
|
|
}
|
|
if (acctid(0, valid_acct) < 0) {
|
|
printf ("Bad account id: %d\n", valid_acct);
|
|
exit(1);
|
|
}
|
|
|
|
/*
|
|
* Now set shares, quotas, limits, including CPU time for the
|
|
* (interactive) job and process, and set up permissions
|
|
* (for chown etc), etc.
|
|
*/
|
|
if (setshares(ue.ue_uid, valid_acct, printf, 0, 0)) {
|
|
printf("Unable to give %d shares to <%s>(%d/%d)\n",
|
|
ue.ue_shares, ue.ue_name, ue.ue_uid, valid_acct);
|
|
exit(1);
|
|
}
|
|
|
|
sr = setlimits(username, C_PROC, pid, UDBRC_INTER);
|
|
if (sr != NULL) {
|
|
debug("%.200s", sr);
|
|
exit(1);
|
|
}
|
|
sr = setlimits(username, C_JOB, jid, UDBRC_INTER);
|
|
if (sr != NULL) {
|
|
debug("%.200s", sr);
|
|
exit(1);
|
|
}
|
|
/*
|
|
* Place the service provider information into
|
|
* the session table (Unicos) or job table (Unicos/mk).
|
|
* There exist double defines for the job/session table in
|
|
* unicos/mk (jtab.h) so no need for a compile time switch.
|
|
*/
|
|
memset(&init_info, '\0', sizeof(init_info));
|
|
init_info.s_sessinit.si_id = URM_SPT_LOGIN;
|
|
init_info.s_sessinit.si_pid = getpid();
|
|
init_info.s_sessinit.si_sid = jid;
|
|
sesscntl(0, S_SETSERVPO, (int)&init_info);
|
|
|
|
/*
|
|
* Set user and controlling tty security attributes.
|
|
*/
|
|
if (SecureSys) {
|
|
if (setusrv(&usrv) == -1) {
|
|
debug("setusrv() failed, errno = %d",errno);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* The rc.* and /etc/sdaemon methods of starting a program on unicos/unicosmk
|
|
* can have pal privileges that sshd can inherit which
|
|
* could allow a user to su to root with out a password.
|
|
* This subroutine clears all privileges.
|
|
*/
|
|
void
|
|
drop_cray_privs()
|
|
{
|
|
#if defined(_SC_CRAY_PRIV_SU)
|
|
priv_proc_t *privstate;
|
|
int result;
|
|
extern int priv_set_proc();
|
|
extern priv_proc_t *priv_init_proc();
|
|
|
|
/*
|
|
* If ether of theses two flags are not set
|
|
* then don't allow this version of ssh to run.
|
|
*/
|
|
if (!sysconf(_SC_CRAY_PRIV_SU))
|
|
fatal("Not PRIV_SU system.");
|
|
if (!sysconf(_SC_CRAY_POSIX_PRIV))
|
|
fatal("Not POSIX_PRIV.");
|
|
|
|
debug("Setting MLS labels.");;
|
|
|
|
if (sysconf(_SC_CRAY_SECURE_MAC)) {
|
|
usrv.sv_minlvl = SYSLOW;
|
|
usrv.sv_actlvl = SYSHIGH;
|
|
usrv.sv_maxlvl = SYSHIGH;
|
|
} else {
|
|
usrv.sv_minlvl = sysv.sy_minlvl;
|
|
usrv.sv_actlvl = sysv.sy_minlvl;
|
|
usrv.sv_maxlvl = sysv.sy_maxlvl;
|
|
}
|
|
usrv.sv_actcmp = 0;
|
|
usrv.sv_valcmp = sysv.sy_valcmp;
|
|
|
|
usrv.sv_intcat = TFM_SYSTEM;
|
|
usrv.sv_valcat |= (TFM_SYSTEM | TFM_SYSFILE);
|
|
|
|
if (setusrv(&usrv) < 0) {
|
|
fatal("%s(%d): setusrv(): %s", __FILE__, __LINE__,
|
|
strerror(errno));
|
|
}
|
|
|
|
if ((privstate = priv_init_proc()) != NULL) {
|
|
result = priv_set_proc(privstate);
|
|
if (result != 0 ) {
|
|
fatal("%s(%d): priv_set_proc(): %s",
|
|
__FILE__, __LINE__, strerror(errno));
|
|
}
|
|
priv_free_proc(privstate);
|
|
}
|
|
debug ("Privileges should be cleared...");
|
|
#else
|
|
/* XXX: do this differently */
|
|
# error Cray systems must be run with _SC_CRAY_PRIV_SU on!
|
|
#endif
|
|
}
|
|
|
|
|
|
/*
|
|
* Retain utmp/wtmp information - used by cray accounting.
|
|
*/
|
|
void
|
|
cray_retain_utmp(struct utmp *ut, int pid)
|
|
{
|
|
int fd;
|
|
struct utmp utmp;
|
|
|
|
if ((fd = open(UTMP_FILE, O_RDONLY)) != -1) {
|
|
/* XXX use atomicio */
|
|
while (read(fd, (char *)&utmp, sizeof(utmp)) == sizeof(utmp)) {
|
|
if (pid == utmp.ut_pid) {
|
|
ut->ut_jid = utmp.ut_jid;
|
|
strncpy(ut->ut_tpath, utmp.ut_tpath, sizeof(utmp.ut_tpath));
|
|
strncpy(ut->ut_host, utmp.ut_host, sizeof(utmp.ut_host));
|
|
strncpy(ut->ut_name, utmp.ut_name, sizeof(utmp.ut_name));
|
|
break;
|
|
}
|
|
}
|
|
close(fd);
|
|
} else
|
|
fatal("Unable to open utmp file");
|
|
}
|
|
|
|
/*
|
|
* tmpdir support.
|
|
*/
|
|
|
|
/*
|
|
* find and delete jobs tmpdir.
|
|
*/
|
|
void
|
|
cray_delete_tmpdir(char *login, int jid, uid_t uid)
|
|
{
|
|
static char jtmp[TPATHSIZ];
|
|
struct stat statbuf;
|
|
int child, c, wstat;
|
|
|
|
for (c = 'a'; c <= 'z'; c++) {
|
|
snprintf(jtmp, TPATHSIZ, "%s/jtmp.%06d%c", JTMPDIR, jid, c);
|
|
if (stat(jtmp, &statbuf) == 0 && statbuf.st_uid == uid)
|
|
break;
|
|
}
|
|
|
|
if (c > 'z')
|
|
return;
|
|
|
|
if ((child = fork()) == 0) {
|
|
execl(CLEANTMPCMD, CLEANTMPCMD, login, jtmp, (char *)NULL);
|
|
fatal("cray_delete_tmpdir: execl of CLEANTMPCMD failed");
|
|
}
|
|
|
|
while (waitpid(child, &wstat, 0) == -1 && errno == EINTR)
|
|
;
|
|
}
|
|
|
|
/*
|
|
* Remove tmpdir on job termination.
|
|
*/
|
|
void
|
|
cray_job_termination_handler(int sig)
|
|
{
|
|
int jid;
|
|
char *login = NULL;
|
|
struct jtab jtab;
|
|
|
|
if ((jid = waitjob(&jtab)) == -1 ||
|
|
(login = uid2nam(jtab.j_uid)) == NULL)
|
|
return;
|
|
|
|
cray_delete_tmpdir(login, jid, jtab.j_uid);
|
|
}
|
|
|
|
/*
|
|
* Set job id and create tmpdir directory.
|
|
*/
|
|
void
|
|
cray_init_job(struct passwd *pw)
|
|
{
|
|
int jid;
|
|
int c;
|
|
|
|
jid = setjob(pw->pw_uid, WJSIGNAL);
|
|
if (jid < 0)
|
|
fatal("System call setjob failure");
|
|
|
|
for (c = 'a'; c <= 'z'; c++) {
|
|
snprintf(cray_tmpdir, TPATHSIZ, "%s/jtmp.%06d%c", JTMPDIR, jid, c);
|
|
if (mkdir(cray_tmpdir, JTMPMODE) != 0)
|
|
continue;
|
|
if (chown(cray_tmpdir, pw->pw_uid, pw->pw_gid) != 0) {
|
|
rmdir(cray_tmpdir);
|
|
continue;
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (c > 'z')
|
|
cray_tmpdir[0] = '\0';
|
|
}
|
|
|
|
void
|
|
cray_set_tmpdir(struct utmp *ut)
|
|
{
|
|
int jid;
|
|
struct jtab jbuf;
|
|
|
|
if ((jid = getjtab(&jbuf)) < 0)
|
|
return;
|
|
|
|
/*
|
|
* Set jid and tmpdir in utmp record.
|
|
*/
|
|
ut->ut_jid = jid;
|
|
strncpy(ut->ut_tpath, cray_tmpdir, TPATHSIZ);
|
|
}
|
|
#endif /* UNICOS */
|
|
|
|
#ifdef _UNICOSMP
|
|
#include <pwd.h>
|
|
/*
|
|
* Set job id and create tmpdir directory.
|
|
*/
|
|
void
|
|
cray_init_job(struct passwd *pw)
|
|
{
|
|
initrm_silent(pw->pw_uid);
|
|
return;
|
|
}
|
|
#endif /* _UNICOSMP */
|