xref: /csrg-svn/old/athena/kpasswd/kpasswdd.c (revision 38050)
1*38050Skfall /*
2*38050Skfall  * Copyright (c) 1989 The Regents of the University of California.
3*38050Skfall  * All rights reserved.
4*38050Skfall  *
5*38050Skfall  * Redistribution and use in source and binary forms are permitted
6*38050Skfall  * provided that the above copyright notice and this paragraph are
7*38050Skfall  * duplicated in all such forms and that any documentation,
8*38050Skfall  * advertising materials, and other materials related to such
9*38050Skfall  * distribution and use acknowledge that the software was developed
10*38050Skfall  * by the University of California, Berkeley.  The name of the
11*38050Skfall  * University may not be used to endorse or promote products derived
12*38050Skfall  * from this software without specific prior written permission.
13*38050Skfall  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
14*38050Skfall  * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
15*38050Skfall  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
16*38050Skfall  */
1736333Skfall 
18*38050Skfall #ifndef lint
19*38050Skfall static char sccsid[] = "@(#)kpasswdd.c	1.2 (Berkeley) 05/17/89";
20*38050Skfall #endif /* not lint */
21*38050Skfall 
2236333Skfall /*
2336333Skfall  * kpasswdd - update a principal's passwd field in the Kerberos
2436333Skfall  * 	      database.  Called from inetd.
2536333Skfall  * K. Fall
2636333Skfall  * 12-Dec-88
2736333Skfall  */
2836333Skfall 
2936333Skfall #include <stdio.h>
3036333Skfall #include <sys/types.h>
3136333Skfall #include <sys/time.h>
3236333Skfall #include <syslog.h>
3336333Skfall #include <kerberos/krb.h>
3436333Skfall #include <kerberos/krb_db.h>
3536333Skfall #include <sys/resource.h>
3636333Skfall #include <sys/signal.h>
3736333Skfall #include <netinet/in.h>
3836333Skfall #include "kpasswd_proto.h"
3936333Skfall 
4036333Skfall static	struct kpasswd_data	kpwd_data;
4136333Skfall static	C_Block			master_key, key;
4236333Skfall static	Key_schedule		master_key_schedule,
4336333Skfall 				key_schedule, random_sched;
4436333Skfall int				mkeyversion;
4536333Skfall AUTH_DAT			kdata;
4636333Skfall static	Principal		principal_data;
4736333Skfall static	struct update_data	ud_data;
4836333Skfall 
4936333Skfall char				inst[INST_SZ];
5036333Skfall char				version[9];
5136333Skfall KTEXT_ST			ticket;
5236333Skfall 
5336333Skfall char	*progname;		/* for the library */
5436333Skfall 
main()5536333Skfall main()
5636333Skfall {
5736333Skfall 	struct	sockaddr_in	foreign;
5836333Skfall 	int			foreign_len = sizeof(foreign);
5936333Skfall 	int			rval, more;
6036333Skfall 	static  char	name[] = "kpasswdd";
6136333Skfall 
6236333Skfall 	static	struct rlimit	rl = { 0, 0 };
6336333Skfall 
6436333Skfall 	progname = name;
6536333Skfall 	openlog("kpasswdd", LOG_CONS | LOG_PID, LOG_AUTH);
6636333Skfall 
6736333Skfall 	signal(SIGHUP, SIG_IGN);
6836333Skfall 	signal(SIGINT, SIG_IGN);
6936333Skfall 	signal(SIGTSTP, SIG_IGN);
7036333Skfall 	if(setrlimit(RLIMIT_CORE, &rl) < 0) {
7136333Skfall 		syslog(LOG_ERR, "setrlimit: %m");
7236333Skfall 		exit(1);
7336333Skfall 	}
7436333Skfall 
7536333Skfall 	if(getpeername(0, &foreign, &foreign_len) < 0) {
7636333Skfall 		syslog(LOG_ERR,"getpeername: %m");
7736333Skfall 		exit(1);
7836333Skfall 	}
7936333Skfall 
8036333Skfall 	strcpy(inst, "*");
8136333Skfall 	rval = krb_recvauth(
8236333Skfall 		0L,				/* !MUTUAL */
8336333Skfall 		0,				/* file desc */
8436333Skfall 		&ticket,			/* client's ticket */
8536333Skfall 		SERVICE,			/* expected service */
8636333Skfall 		inst,				/* expected instance */
8736333Skfall 		&foreign,			/* foreign addr */
8836333Skfall 		(struct sockaddr_in *) 0,
8936333Skfall 		&kdata,
9036333Skfall 		"",
9136333Skfall 		(bit_64 *) NULL,		/* key schedule */
9236333Skfall 		version
9336333Skfall 	);
9436333Skfall 
9536333Skfall 
9636333Skfall 	if(rval != KSUCCESS) {
9736333Skfall 		syslog(LOG_ERR, "krb_recvauth: %s", krb_err_txt[rval]);
9836333Skfall 		cleanup();
9936333Skfall 		exit(1);
10036333Skfall 	}
10136333Skfall 
10236333Skfall 
10336333Skfall 	/* get master key */
10436333Skfall 	if(kdb_get_master_key(0, master_key, master_key_schedule) != 0) {
10536333Skfall 		syslog(LOG_ERR, "couldn't get master key");
10636333Skfall 		cleanup();
10736333Skfall 		exit(1);
10836333Skfall 	}
10936333Skfall 
11036333Skfall 	mkeyversion =
11136333Skfall 	   kdb_get_master_key(master_key, master_key_schedule, NULL);
11236333Skfall 
11336333Skfall 
11436333Skfall 	if(mkeyversion < 0) {
11536333Skfall 		syslog(LOG_NOTICE, "couldn't verify master key");
11636333Skfall 		cleanup();
11736333Skfall 		exit(1);
11836333Skfall 	}
11936333Skfall 
12036333Skfall 	/* get principal info */
12136333Skfall 	rval = kerb_get_principal(
12236333Skfall 		kdata.pname,
12336333Skfall 		kdata.pinst,
12436333Skfall 		&principal_data,
12536333Skfall 		1,
12636333Skfall 		&more
12736333Skfall 	);
12836333Skfall 
12936333Skfall 	if(rval != 1 || (more != 0)) {
13036333Skfall 		syslog(LOG_NOTICE, "more than 1 entry for %s.%s",
13136333Skfall 			kdata.pname, kdata.pinst);
13236333Skfall 		cleanup();
13336333Skfall 		exit(1);
13436333Skfall 	}
13536333Skfall 
13636333Skfall 	/* get the user's key */
13736333Skfall 
13836333Skfall 	bcopy(&principal_data.key_low, key, 4);
13936333Skfall 	bcopy(&principal_data.key_high, ((long *) key) + 1, 4);
14036333Skfall 	kdb_encrypt_key(key, key, master_key, master_key_schedule,
14136333Skfall 		DECRYPT);
14236333Skfall 	key_sched(key, key_schedule);
14336333Skfall 	des_set_key(key, key_schedule);
14436333Skfall 
14536333Skfall 
14636333Skfall 	/* get random key and send it over {random} Kperson */
14736333Skfall 
14836333Skfall 	random_key(kpwd_data.random_key);
14936333Skfall 	strcpy(kpwd_data.secure_msg, SECURE_STRING);
15036333Skfall 	if(des_write(0, &kpwd_data, sizeof(kpwd_data)) != sizeof(kpwd_data)) {
15136333Skfall 		syslog(LOG_ERR, "error writing initial data");
15236333Skfall 		cleanup();
15336333Skfall 		exit(1);
15436333Skfall 	}
15536333Skfall 
15636333Skfall 	bzero(key, sizeof(key));
15736333Skfall 	bzero(key_schedule, sizeof(key_schedule));
15836333Skfall 
15936333Skfall 	/* now read update info: { info }Krandom */
16036333Skfall 
16136333Skfall 	key_sched(kpwd_data.random_key, random_sched);
16236333Skfall 	des_set_key(kpwd_data.random_key, random_sched);
16336333Skfall 	if(des_read(0, &ud_data, sizeof(ud_data)) != sizeof(ud_data)) {
16436333Skfall 		syslog(LOG_ERR, "update aborted");
16536333Skfall 		cleanup();
16636333Skfall 		exit(1);
16736333Skfall 	}
16836333Skfall 
16936333Skfall 	/* validate info string by looking at the embedded string */
17036333Skfall 
17136333Skfall 	if(strcmp(ud_data.secure_msg, SECURE_STRING)) {
17236333Skfall 		syslog(LOG_NOTICE, "invalid update from %s",
17336333Skfall 			inet_ntoa(foreign.sin_addr));
17436333Skfall 		cleanup();
17536333Skfall 		exit(1);
17636333Skfall 	}
17736333Skfall 
17836333Skfall 	/* produce the new key entry in the database { key }Kmaster */
17936333Skfall 	string_to_key(ud_data.pw, key);
18036333Skfall 	kdb_encrypt_key(key, key,
18136333Skfall 		master_key, master_key_schedule,
18236333Skfall 		ENCRYPT);
18336333Skfall 	bcopy(key, &principal_data.key_low, 4);
18436333Skfall 	bcopy(((long *) key) + 1,
18536333Skfall 		&principal_data.key_high, 4);
18636333Skfall 	bzero(key, sizeof(key));
18736333Skfall 	principal_data.key_version++;
18836333Skfall 	if(kerb_put_principal(&principal_data, 1)) {
18936333Skfall 		syslog(LOG_ERR, "couldn't write new record for %s.%s",
19036333Skfall 			principal_data.name, principal_data.instance);
19136333Skfall 		cleanup();
19236333Skfall 		exit(1);
19336333Skfall 	}
19436333Skfall 
19536333Skfall 	syslog(LOG_NOTICE,"wrote new password field for %s.%s from %s",
19636333Skfall 		principal_data.name,
19736333Skfall 		principal_data.instance,
19836333Skfall 		inet_ntoa(foreign.sin_addr)
19936333Skfall 	);
20036333Skfall 
20136333Skfall 	send_ack(0, "Update complete.\n");
20236333Skfall 	cleanup();
20336333Skfall 	exit(0);
20436333Skfall }
20536333Skfall 
cleanup()20636333Skfall cleanup()
20736333Skfall {
20836333Skfall 	bzero(&kpwd_data, sizeof(kpwd_data));
20936333Skfall 	bzero(master_key, sizeof(master_key));
21036333Skfall 	bzero(master_key_schedule, sizeof(master_key_schedule));
21136333Skfall 	bzero(key, sizeof(key));
21236333Skfall 	bzero(key_schedule, sizeof(key_schedule));
21336333Skfall 	bzero(random_sched, sizeof(random_sched));
21436333Skfall 	bzero(&principal_data, sizeof(principal_data));
21536333Skfall 	bzero(&ud_data, sizeof(ud_data));
21636333Skfall }
21736333Skfall 
send_ack(remote,msg)21836333Skfall send_ack(remote, msg)
21936333Skfall 	int	remote;
22036333Skfall 	char	*msg;
22136333Skfall {
22236333Skfall 	int	cc;
22336333Skfall 	cc = des_write(remote, msg, strlen(msg) + 1);
22436333Skfall 	if(cc <= 0) {
22536333Skfall 		syslog(LOG_ERR, "error writing ack");
22636333Skfall 		cleanup();
22736333Skfall 		exit(1);
22836333Skfall 	}
22936333Skfall }
230