mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-12-26 03:42:07 +00:00
d783435315
[OVERVIEW atomicio.c atomicio.h auth-bsdauth.c auth-chall.c auth-krb5.c] [auth-options.c auth-options.h auth-passwd.c auth-rh-rsa.c auth-rhosts.c] [auth-rsa.c auth-skey.c auth.c auth.h auth1.c auth2-chall.c auth2-gss.c] [auth2-hostbased.c auth2-kbdint.c auth2-none.c auth2-passwd.c ] [auth2-pubkey.c auth2.c authfd.c authfd.h authfile.c bufaux.c bufbn.c] [buffer.c buffer.h canohost.c channels.c channels.h cipher-3des1.c] [cipher-bf1.c cipher-ctr.c cipher.c cleanup.c clientloop.c compat.c] [compress.c deattack.c dh.c dispatch.c dns.c dns.h fatal.c groupaccess.c] [groupaccess.h gss-genr.c gss-serv-krb5.c gss-serv.c hostfile.c kex.c] [kex.h kexdh.c kexdhc.c kexdhs.c kexgex.c kexgexc.c kexgexs.c key.c] [key.h log.c log.h mac.c match.c md-sha256.c misc.c misc.h moduli.c] [monitor.c monitor_fdpass.c monitor_mm.c monitor_mm.h monitor_wrap.c] [monitor_wrap.h msg.c nchan.c packet.c progressmeter.c readconf.c] [readconf.h readpass.c rsa.c scard.c scard.h scp.c servconf.c servconf.h] [serverloop.c session.c session.h sftp-client.c sftp-common.c] [sftp-common.h sftp-glob.c sftp-server.c sftp.c ssh-add.c ssh-agent.c] [ssh-dss.c ssh-gss.h ssh-keygen.c ssh-keyscan.c ssh-keysign.c ssh-rsa.c] [ssh.c ssh.h sshconnect.c sshconnect.h sshconnect1.c sshconnect2.c] [sshd.c sshlogin.c sshlogin.h sshpty.c sshpty.h sshtty.c ttymodes.c] [uidswap.c uidswap.h uuencode.c uuencode.h xmalloc.c xmalloc.h] [loginrec.c loginrec.h openbsd-compat/port-aix.c openbsd-compat/port-tun.h] almost entirely get rid of the culture of ".h files that include .h files" ok djm, sort of ok stevesk makes the pain stop in one easy step NB. portable commit contains everything *except* removing includes.h, as that will take a fair bit more work as we move headers that are required for portability workarounds to defines.h. (also, this step wasn't "easy")
250 lines
6.0 KiB
C
250 lines
6.0 KiB
C
/* $OpenBSD: sshpty.c,v 1.26 2006/08/03 03:34:42 deraadt Exp $ */
|
|
/*
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
* All rights reserved
|
|
* Allocating a pseudo-terminal, and making it the controlling tty.
|
|
*
|
|
* As far as I am concerned, the code I have written for this software
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
* software must be clearly marked as such, and if the derived work is
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
* called by a name other than "ssh" or "Secure Shell".
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/stat.h>
|
|
#include <signal.h>
|
|
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <grp.h>
|
|
#ifdef HAVE_PATHS_H
|
|
# include <paths.h>
|
|
#endif
|
|
#include <pwd.h>
|
|
#include <stdarg.h>
|
|
#include <string.h>
|
|
#include <termios.h>
|
|
#ifdef HAVE_UTIL_H
|
|
# include <util.h>
|
|
#endif
|
|
#include <unistd.h>
|
|
|
|
#include "sshpty.h"
|
|
#include "log.h"
|
|
#include "misc.h"
|
|
|
|
#ifdef HAVE_PTY_H
|
|
# include <pty.h>
|
|
#endif
|
|
|
|
#ifndef O_NOCTTY
|
|
#define O_NOCTTY 0
|
|
#endif
|
|
|
|
/*
|
|
* Allocates and opens a pty. Returns 0 if no pty could be allocated, or
|
|
* nonzero if a pty was successfully allocated. On success, open file
|
|
* descriptors for the pty and tty sides and the name of the tty side are
|
|
* returned (the buffer must be able to hold at least 64 characters).
|
|
*/
|
|
|
|
int
|
|
pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, size_t namebuflen)
|
|
{
|
|
/* openpty(3) exists in OSF/1 and some other os'es */
|
|
char *name;
|
|
int i;
|
|
|
|
i = openpty(ptyfd, ttyfd, NULL, NULL, NULL);
|
|
if (i < 0) {
|
|
error("openpty: %.100s", strerror(errno));
|
|
return 0;
|
|
}
|
|
name = ttyname(*ttyfd);
|
|
if (!name)
|
|
fatal("openpty returns device for which ttyname fails.");
|
|
|
|
strlcpy(namebuf, name, namebuflen); /* possible truncation */
|
|
return 1;
|
|
}
|
|
|
|
/* Releases the tty. Its ownership is returned to root, and permissions to 0666. */
|
|
|
|
void
|
|
pty_release(const char *tty)
|
|
{
|
|
if (chown(tty, (uid_t) 0, (gid_t) 0) < 0)
|
|
error("chown %.100s 0 0 failed: %.100s", tty, strerror(errno));
|
|
if (chmod(tty, (mode_t) 0666) < 0)
|
|
error("chmod %.100s 0666 failed: %.100s", tty, strerror(errno));
|
|
}
|
|
|
|
/* Makes the tty the process's controlling tty and sets it to sane modes. */
|
|
|
|
void
|
|
pty_make_controlling_tty(int *ttyfd, const char *tty)
|
|
{
|
|
int fd;
|
|
#ifdef USE_VHANGUP
|
|
void *old;
|
|
#endif /* USE_VHANGUP */
|
|
|
|
#ifdef _UNICOS
|
|
if (setsid() < 0)
|
|
error("setsid: %.100s", strerror(errno));
|
|
|
|
fd = open(tty, O_RDWR|O_NOCTTY);
|
|
if (fd != -1) {
|
|
signal(SIGHUP, SIG_IGN);
|
|
ioctl(fd, TCVHUP, (char *)NULL);
|
|
signal(SIGHUP, SIG_DFL);
|
|
setpgid(0, 0);
|
|
close(fd);
|
|
} else {
|
|
error("Failed to disconnect from controlling tty.");
|
|
}
|
|
|
|
debug("Setting controlling tty using TCSETCTTY.");
|
|
ioctl(*ttyfd, TCSETCTTY, NULL);
|
|
fd = open("/dev/tty", O_RDWR);
|
|
if (fd < 0)
|
|
error("%.100s: %.100s", tty, strerror(errno));
|
|
close(*ttyfd);
|
|
*ttyfd = fd;
|
|
#else /* _UNICOS */
|
|
|
|
/* First disconnect from the old controlling tty. */
|
|
#ifdef TIOCNOTTY
|
|
fd = open(_PATH_TTY, O_RDWR | O_NOCTTY);
|
|
if (fd >= 0) {
|
|
(void) ioctl(fd, TIOCNOTTY, NULL);
|
|
close(fd);
|
|
}
|
|
#endif /* TIOCNOTTY */
|
|
if (setsid() < 0)
|
|
error("setsid: %.100s", strerror(errno));
|
|
|
|
/*
|
|
* Verify that we are successfully disconnected from the controlling
|
|
* tty.
|
|
*/
|
|
fd = open(_PATH_TTY, O_RDWR | O_NOCTTY);
|
|
if (fd >= 0) {
|
|
error("Failed to disconnect from controlling tty.");
|
|
close(fd);
|
|
}
|
|
/* Make it our controlling tty. */
|
|
#ifdef TIOCSCTTY
|
|
debug("Setting controlling tty using TIOCSCTTY.");
|
|
if (ioctl(*ttyfd, TIOCSCTTY, NULL) < 0)
|
|
error("ioctl(TIOCSCTTY): %.100s", strerror(errno));
|
|
#endif /* TIOCSCTTY */
|
|
#ifdef NEED_SETPGRP
|
|
if (setpgrp(0,0) < 0)
|
|
error("SETPGRP %s",strerror(errno));
|
|
#endif /* NEED_SETPGRP */
|
|
#ifdef USE_VHANGUP
|
|
old = signal(SIGHUP, SIG_IGN);
|
|
vhangup();
|
|
signal(SIGHUP, old);
|
|
#endif /* USE_VHANGUP */
|
|
fd = open(tty, O_RDWR);
|
|
if (fd < 0) {
|
|
error("%.100s: %.100s", tty, strerror(errno));
|
|
} else {
|
|
#ifdef USE_VHANGUP
|
|
close(*ttyfd);
|
|
*ttyfd = fd;
|
|
#else /* USE_VHANGUP */
|
|
close(fd);
|
|
#endif /* USE_VHANGUP */
|
|
}
|
|
/* Verify that we now have a controlling tty. */
|
|
fd = open(_PATH_TTY, O_WRONLY);
|
|
if (fd < 0)
|
|
error("open /dev/tty failed - could not set controlling tty: %.100s",
|
|
strerror(errno));
|
|
else
|
|
close(fd);
|
|
#endif /* _UNICOS */
|
|
}
|
|
|
|
/* Changes the window size associated with the pty. */
|
|
|
|
void
|
|
pty_change_window_size(int ptyfd, u_int row, u_int col,
|
|
u_int xpixel, u_int ypixel)
|
|
{
|
|
struct winsize w;
|
|
|
|
/* may truncate u_int -> u_short */
|
|
w.ws_row = row;
|
|
w.ws_col = col;
|
|
w.ws_xpixel = xpixel;
|
|
w.ws_ypixel = ypixel;
|
|
(void) ioctl(ptyfd, TIOCSWINSZ, &w);
|
|
}
|
|
|
|
void
|
|
pty_setowner(struct passwd *pw, const char *tty)
|
|
{
|
|
struct group *grp;
|
|
gid_t gid;
|
|
mode_t mode;
|
|
struct stat st;
|
|
|
|
/* Determine the group to make the owner of the tty. */
|
|
grp = getgrnam("tty");
|
|
if (grp) {
|
|
gid = grp->gr_gid;
|
|
mode = S_IRUSR | S_IWUSR | S_IWGRP;
|
|
} else {
|
|
gid = pw->pw_gid;
|
|
mode = S_IRUSR | S_IWUSR | S_IWGRP | S_IWOTH;
|
|
}
|
|
|
|
/*
|
|
* Change owner and mode of the tty as required.
|
|
* Warn but continue if filesystem is read-only and the uids match/
|
|
* tty is owned by root.
|
|
*/
|
|
if (stat(tty, &st))
|
|
fatal("stat(%.100s) failed: %.100s", tty,
|
|
strerror(errno));
|
|
|
|
#ifdef WITH_SELINUX
|
|
ssh_selinux_setup_pty(pw->pw_name, tty);
|
|
#endif
|
|
|
|
if (st.st_uid != pw->pw_uid || st.st_gid != gid) {
|
|
if (chown(tty, pw->pw_uid, gid) < 0) {
|
|
if (errno == EROFS &&
|
|
(st.st_uid == pw->pw_uid || st.st_uid == 0))
|
|
debug("chown(%.100s, %u, %u) failed: %.100s",
|
|
tty, (u_int)pw->pw_uid, (u_int)gid,
|
|
strerror(errno));
|
|
else
|
|
fatal("chown(%.100s, %u, %u) failed: %.100s",
|
|
tty, (u_int)pw->pw_uid, (u_int)gid,
|
|
strerror(errno));
|
|
}
|
|
}
|
|
|
|
if ((st.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO)) != mode) {
|
|
if (chmod(tty, mode) < 0) {
|
|
if (errno == EROFS &&
|
|
(st.st_mode & (S_IRGRP | S_IROTH)) == 0)
|
|
debug("chmod(%.100s, 0%o) failed: %.100s",
|
|
tty, (u_int)mode, strerror(errno));
|
|
else
|
|
fatal("chmod(%.100s, 0%o) failed: %.100s",
|
|
tty, (u_int)mode, strerror(errno));
|
|
}
|
|
}
|
|
}
|