xref: /minix3/lib/libtelnet/sra.c (revision 7348b5c52b47a1c199a1754a40bbfa360b536de2)
1*7348b5c5SDavid van Moolenbroek /*-
2*7348b5c5SDavid van Moolenbroek  * Copyright (c) 1991, 1993
3*7348b5c5SDavid van Moolenbroek  *      Dave Safford.  All rights reserved.
4*7348b5c5SDavid van Moolenbroek  *
5*7348b5c5SDavid van Moolenbroek  * Redistribution and use in source and binary forms, with or without
6*7348b5c5SDavid van Moolenbroek  * modification, are permitted provided that the following conditions
7*7348b5c5SDavid van Moolenbroek  * are met:
8*7348b5c5SDavid van Moolenbroek  * 1. Redistributions of source code must retain the above copyright
9*7348b5c5SDavid van Moolenbroek  *    notice, this list of conditions and the following disclaimer.
10*7348b5c5SDavid van Moolenbroek  * 2. Redistributions in binary form must reproduce the above copyright
11*7348b5c5SDavid van Moolenbroek  *    notice, this list of conditions and the following disclaimer in the
12*7348b5c5SDavid van Moolenbroek  *    documentation and/or other materials provided with the distribution.
13*7348b5c5SDavid van Moolenbroek  * 3. Neither the name of the University nor the names of its contributors
14*7348b5c5SDavid van Moolenbroek  *    may be used to endorse or promote products derived from this software
15*7348b5c5SDavid van Moolenbroek  *    without specific prior written permission.
16*7348b5c5SDavid van Moolenbroek  *
17*7348b5c5SDavid van Moolenbroek  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18*7348b5c5SDavid van Moolenbroek  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19*7348b5c5SDavid van Moolenbroek  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20*7348b5c5SDavid van Moolenbroek  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21*7348b5c5SDavid van Moolenbroek  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22*7348b5c5SDavid van Moolenbroek  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23*7348b5c5SDavid van Moolenbroek  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24*7348b5c5SDavid van Moolenbroek  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25*7348b5c5SDavid van Moolenbroek  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26*7348b5c5SDavid van Moolenbroek  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27*7348b5c5SDavid van Moolenbroek  * SUCH DAMAGE.
28*7348b5c5SDavid van Moolenbroek  *
29*7348b5c5SDavid van Moolenbroek  */
30*7348b5c5SDavid van Moolenbroek 
31*7348b5c5SDavid van Moolenbroek #include <sys/cdefs.h>
32*7348b5c5SDavid van Moolenbroek #ifdef notdef
33*7348b5c5SDavid van Moolenbroek __FBSDID("$FreeBSD: src/contrib/telnet/libtelnet/sra.c,v 1.16 2002/05/06 09:48:02 markm Exp $");
34*7348b5c5SDavid van Moolenbroek #else
35*7348b5c5SDavid van Moolenbroek __RCSID("$NetBSD: sra.c,v 1.11 2012/01/09 15:25:34 christos Exp $");
36*7348b5c5SDavid van Moolenbroek #endif
37*7348b5c5SDavid van Moolenbroek 
38*7348b5c5SDavid van Moolenbroek #ifdef	SRA
39*7348b5c5SDavid van Moolenbroek #ifdef	ENCRYPTION
40*7348b5c5SDavid van Moolenbroek #include <sys/types.h>
41*7348b5c5SDavid van Moolenbroek #include <arpa/telnet.h>
42*7348b5c5SDavid van Moolenbroek #include <paths.h>
43*7348b5c5SDavid van Moolenbroek #include <pwd.h>
44*7348b5c5SDavid van Moolenbroek #include <stdio.h>
45*7348b5c5SDavid van Moolenbroek #include <stdlib.h>
46*7348b5c5SDavid van Moolenbroek #include <string.h>
47*7348b5c5SDavid van Moolenbroek #include <syslog.h>
48*7348b5c5SDavid van Moolenbroek #include <ttyent.h>
49*7348b5c5SDavid van Moolenbroek 
50*7348b5c5SDavid van Moolenbroek #ifndef NOPAM
51*7348b5c5SDavid van Moolenbroek #include <security/pam_appl.h>
52*7348b5c5SDavid van Moolenbroek #else
53*7348b5c5SDavid van Moolenbroek #include <unistd.h>
54*7348b5c5SDavid van Moolenbroek #endif
55*7348b5c5SDavid van Moolenbroek 
56*7348b5c5SDavid van Moolenbroek #include "auth.h"
57*7348b5c5SDavid van Moolenbroek #include "misc.h"
58*7348b5c5SDavid van Moolenbroek #include "encrypt.h"
59*7348b5c5SDavid van Moolenbroek #include "pk.h"
60*7348b5c5SDavid van Moolenbroek 
61*7348b5c5SDavid van Moolenbroek char pka[HEXKEYBYTES+1], ska[HEXKEYBYTES+1], pkb[HEXKEYBYTES+1];
62*7348b5c5SDavid van Moolenbroek char *user, *pass, *xuser, *xpass;
63*7348b5c5SDavid van Moolenbroek char *passprompt, *xpassprompt;
64*7348b5c5SDavid van Moolenbroek DesData ck;
65*7348b5c5SDavid van Moolenbroek IdeaData ik;
66*7348b5c5SDavid van Moolenbroek 
67*7348b5c5SDavid van Moolenbroek extern int auth_debug_mode;
68*7348b5c5SDavid van Moolenbroek extern char *line; 		/* see sys_term.c */
69*7348b5c5SDavid van Moolenbroek 
70*7348b5c5SDavid van Moolenbroek static int sra_valid = 0;
71*7348b5c5SDavid van Moolenbroek static int passwd_sent = 0;
72*7348b5c5SDavid van Moolenbroek 
73*7348b5c5SDavid van Moolenbroek static unsigned char str_data[1024] = { IAC, SB, TELOPT_AUTHENTICATION, 0,
74*7348b5c5SDavid van Moolenbroek 			  		AUTHTYPE_SRA, };
75*7348b5c5SDavid van Moolenbroek 
76*7348b5c5SDavid van Moolenbroek #define SMALL_LEN	256
77*7348b5c5SDavid van Moolenbroek #define XSMALL_LEN	513
78*7348b5c5SDavid van Moolenbroek #define SRA_KEY	0
79*7348b5c5SDavid van Moolenbroek #define SRA_USER 1
80*7348b5c5SDavid van Moolenbroek #define SRA_CONTINUE 2
81*7348b5c5SDavid van Moolenbroek #define SRA_PASS 3
82*7348b5c5SDavid van Moolenbroek #define SRA_ACCEPT 4
83*7348b5c5SDavid van Moolenbroek #define SRA_REJECT 5
84*7348b5c5SDavid van Moolenbroek 
85*7348b5c5SDavid van Moolenbroek static int check_user(char *, const char *);
86*7348b5c5SDavid van Moolenbroek 
87*7348b5c5SDavid van Moolenbroek /* support routine to send out authentication message */
88*7348b5c5SDavid van Moolenbroek static int
Data(Authenticator * ap,int type,void * d,int c)89*7348b5c5SDavid van Moolenbroek Data(Authenticator *ap, int type, void *d, int c)
90*7348b5c5SDavid van Moolenbroek {
91*7348b5c5SDavid van Moolenbroek         unsigned char *p = str_data + 4;
92*7348b5c5SDavid van Moolenbroek 	unsigned char *cd = d;
93*7348b5c5SDavid van Moolenbroek 
94*7348b5c5SDavid van Moolenbroek 	if (c == -1)
95*7348b5c5SDavid van Moolenbroek 		c = strlen(d);
96*7348b5c5SDavid van Moolenbroek 
97*7348b5c5SDavid van Moolenbroek         if (auth_debug_mode) {
98*7348b5c5SDavid van Moolenbroek                 printf("%s:%d: [%d] (%d)",
99*7348b5c5SDavid van Moolenbroek 		    str_data[3] == TELQUAL_IS ? ">>>IS" : ">>>REPLY",
100*7348b5c5SDavid van Moolenbroek 		    str_data[3], type, c);
101*7348b5c5SDavid van Moolenbroek                 printd(d, c);
102*7348b5c5SDavid van Moolenbroek                 printf("\r\n");
103*7348b5c5SDavid van Moolenbroek         }
104*7348b5c5SDavid van Moolenbroek 	*p++ = ap->type;
105*7348b5c5SDavid van Moolenbroek 	*p++ = ap->way;
106*7348b5c5SDavid van Moolenbroek 	*p++ = type;
107*7348b5c5SDavid van Moolenbroek         while (c-- > 0) {
108*7348b5c5SDavid van Moolenbroek                 if ((*p++ = *cd++) == IAC)
109*7348b5c5SDavid van Moolenbroek                         *p++ = IAC;
110*7348b5c5SDavid van Moolenbroek         }
111*7348b5c5SDavid van Moolenbroek         *p++ = IAC;
112*7348b5c5SDavid van Moolenbroek         *p++ = SE;
113*7348b5c5SDavid van Moolenbroek 	if (str_data[3] == TELQUAL_IS)
114*7348b5c5SDavid van Moolenbroek 		printsub('>', &str_data[2], p - (&str_data[2]));
115*7348b5c5SDavid van Moolenbroek         return telnet_net_write(str_data, p - str_data);
116*7348b5c5SDavid van Moolenbroek }
117*7348b5c5SDavid van Moolenbroek 
118*7348b5c5SDavid van Moolenbroek int
sra_init(Authenticator * ap __unused,int server)119*7348b5c5SDavid van Moolenbroek sra_init(Authenticator *ap __unused, int server)
120*7348b5c5SDavid van Moolenbroek {
121*7348b5c5SDavid van Moolenbroek 	if (server)
122*7348b5c5SDavid van Moolenbroek 		str_data[3] = TELQUAL_REPLY;
123*7348b5c5SDavid van Moolenbroek 	else
124*7348b5c5SDavid van Moolenbroek 		str_data[3] = TELQUAL_IS;
125*7348b5c5SDavid van Moolenbroek 
126*7348b5c5SDavid van Moolenbroek 	user = malloc(SMALL_LEN);
127*7348b5c5SDavid van Moolenbroek 	xuser = malloc(XSMALL_LEN);
128*7348b5c5SDavid van Moolenbroek 	pass = malloc(SMALL_LEN);
129*7348b5c5SDavid van Moolenbroek 	xpass = malloc(XSMALL_LEN);
130*7348b5c5SDavid van Moolenbroek 	passprompt = malloc(SMALL_LEN);
131*7348b5c5SDavid van Moolenbroek 	xpassprompt = malloc(XSMALL_LEN);
132*7348b5c5SDavid van Moolenbroek 
133*7348b5c5SDavid van Moolenbroek 	if (user == NULL || xuser == NULL || pass == NULL || xpass ==
134*7348b5c5SDavid van Moolenbroek 	    NULL || passprompt == NULL || xpassprompt == NULL)
135*7348b5c5SDavid van Moolenbroek 		return 0; /* malloc failed */
136*7348b5c5SDavid van Moolenbroek 
137*7348b5c5SDavid van Moolenbroek 	passwd_sent = 0;
138*7348b5c5SDavid van Moolenbroek 
139*7348b5c5SDavid van Moolenbroek 	genkeys(pka, ska);
140*7348b5c5SDavid van Moolenbroek 	return 1;
141*7348b5c5SDavid van Moolenbroek }
142*7348b5c5SDavid van Moolenbroek 
143*7348b5c5SDavid van Moolenbroek /* client received a go-ahead for sra */
144*7348b5c5SDavid van Moolenbroek int
sra_send(Authenticator * ap)145*7348b5c5SDavid van Moolenbroek sra_send(Authenticator *ap)
146*7348b5c5SDavid van Moolenbroek {
147*7348b5c5SDavid van Moolenbroek 	/* send PKA */
148*7348b5c5SDavid van Moolenbroek 
149*7348b5c5SDavid van Moolenbroek 	if (auth_debug_mode)
150*7348b5c5SDavid van Moolenbroek 		printf("Sent PKA to server.\r\n" );
151*7348b5c5SDavid van Moolenbroek 	printf("Trying SRA secure login:\r\n");
152*7348b5c5SDavid van Moolenbroek 	if (!Data(ap, SRA_KEY, (void *)pka, HEXKEYBYTES)) {
153*7348b5c5SDavid van Moolenbroek 		if (auth_debug_mode)
154*7348b5c5SDavid van Moolenbroek 			printf("Not enough room for authentication data\r\n");
155*7348b5c5SDavid van Moolenbroek 		return 0;
156*7348b5c5SDavid van Moolenbroek 	}
157*7348b5c5SDavid van Moolenbroek 
158*7348b5c5SDavid van Moolenbroek 	return 1;
159*7348b5c5SDavid van Moolenbroek }
160*7348b5c5SDavid van Moolenbroek 
161*7348b5c5SDavid van Moolenbroek /* server received an IS -- could be SRA KEY, USER, or PASS */
162*7348b5c5SDavid van Moolenbroek void
sra_is(Authenticator * ap,unsigned char * data,int cnt)163*7348b5c5SDavid van Moolenbroek sra_is(Authenticator *ap, unsigned char *data, int cnt)
164*7348b5c5SDavid van Moolenbroek {
165*7348b5c5SDavid van Moolenbroek 	int valid;
166*7348b5c5SDavid van Moolenbroek 	Session_Key skey;
167*7348b5c5SDavid van Moolenbroek 
168*7348b5c5SDavid van Moolenbroek 	if (cnt-- < 1)
169*7348b5c5SDavid van Moolenbroek 		goto bad;
170*7348b5c5SDavid van Moolenbroek 	switch (*data++) {
171*7348b5c5SDavid van Moolenbroek 
172*7348b5c5SDavid van Moolenbroek 	case SRA_KEY:
173*7348b5c5SDavid van Moolenbroek 		if (cnt < HEXKEYBYTES) {
174*7348b5c5SDavid van Moolenbroek 			Data(ap, SRA_REJECT, (void *)0, 0);
175*7348b5c5SDavid van Moolenbroek 			auth_finished(ap, AUTH_USER);
176*7348b5c5SDavid van Moolenbroek 			if (auth_debug_mode) {
177*7348b5c5SDavid van Moolenbroek 				printf("SRA user rejected for bad PKB\r\n");
178*7348b5c5SDavid van Moolenbroek 			}
179*7348b5c5SDavid van Moolenbroek 			return;
180*7348b5c5SDavid van Moolenbroek 		}
181*7348b5c5SDavid van Moolenbroek 		if (auth_debug_mode)
182*7348b5c5SDavid van Moolenbroek 			printf("Sent pka\r\n");
183*7348b5c5SDavid van Moolenbroek 		if (!Data(ap, SRA_KEY, (void *)pka, HEXKEYBYTES)) {
184*7348b5c5SDavid van Moolenbroek 			if (auth_debug_mode)
185*7348b5c5SDavid van Moolenbroek 				printf("Not enough room\r\n");
186*7348b5c5SDavid van Moolenbroek 			return;
187*7348b5c5SDavid van Moolenbroek 		}
188*7348b5c5SDavid van Moolenbroek 		memcpy(pkb, data, HEXKEYBYTES);
189*7348b5c5SDavid van Moolenbroek 		pkb[HEXKEYBYTES] = '\0';
190*7348b5c5SDavid van Moolenbroek 		common_key(ska, pkb, &ik, &ck);
191*7348b5c5SDavid van Moolenbroek 		return;
192*7348b5c5SDavid van Moolenbroek 
193*7348b5c5SDavid van Moolenbroek 	case SRA_USER:
194*7348b5c5SDavid van Moolenbroek 		/* decode KAB(u) */
195*7348b5c5SDavid van Moolenbroek 		if (cnt > XSMALL_LEN - 1) /* Attempted buffer overflow */
196*7348b5c5SDavid van Moolenbroek 			break;
197*7348b5c5SDavid van Moolenbroek 		memcpy(xuser, data, cnt);
198*7348b5c5SDavid van Moolenbroek 		xuser[cnt] = '\0';
199*7348b5c5SDavid van Moolenbroek 		pk_decode(xuser, user, &ck);
200*7348b5c5SDavid van Moolenbroek 		auth_encrypt_user(user);
201*7348b5c5SDavid van Moolenbroek #ifndef NOPAM
202*7348b5c5SDavid van Moolenbroek 		(void)check_user(user, "*");
203*7348b5c5SDavid van Moolenbroek #endif
204*7348b5c5SDavid van Moolenbroek 		pk_encode(passprompt, xpassprompt, &ck);
205*7348b5c5SDavid van Moolenbroek 		Data(ap, SRA_CONTINUE, xpassprompt, XSMALL_LEN - 1);
206*7348b5c5SDavid van Moolenbroek 
207*7348b5c5SDavid van Moolenbroek 		return;
208*7348b5c5SDavid van Moolenbroek 
209*7348b5c5SDavid van Moolenbroek 	case SRA_PASS:
210*7348b5c5SDavid van Moolenbroek 		if (cnt > XSMALL_LEN - 1) /* Attempted buffer overflow */
211*7348b5c5SDavid van Moolenbroek 			break;
212*7348b5c5SDavid van Moolenbroek 		/* decode KAB(P) */
213*7348b5c5SDavid van Moolenbroek 		memcpy(xpass, data, cnt);
214*7348b5c5SDavid van Moolenbroek 		xpass[cnt] = '\0';
215*7348b5c5SDavid van Moolenbroek 		pk_decode(xpass, pass, &ck);
216*7348b5c5SDavid van Moolenbroek 
217*7348b5c5SDavid van Moolenbroek 		/* check user's password */
218*7348b5c5SDavid van Moolenbroek 		valid = check_user(user, pass);
219*7348b5c5SDavid van Moolenbroek 
220*7348b5c5SDavid van Moolenbroek 		if(valid) {
221*7348b5c5SDavid van Moolenbroek 			/* PAM (via check_user()) may have changed 'user' */
222*7348b5c5SDavid van Moolenbroek 			auth_encrypt_user(user);
223*7348b5c5SDavid van Moolenbroek 			Data(ap, SRA_ACCEPT, (void *)0, 0);
224*7348b5c5SDavid van Moolenbroek 			skey.data = ck;
225*7348b5c5SDavid van Moolenbroek 			skey.type = SK_DES;
226*7348b5c5SDavid van Moolenbroek 			skey.length = 8;
227*7348b5c5SDavid van Moolenbroek 			encrypt_session_key(&skey, 1);
228*7348b5c5SDavid van Moolenbroek 
229*7348b5c5SDavid van Moolenbroek 			sra_valid = 1;
230*7348b5c5SDavid van Moolenbroek 			auth_finished(ap, AUTH_VALID);
231*7348b5c5SDavid van Moolenbroek 			if (auth_debug_mode) {
232*7348b5c5SDavid van Moolenbroek 				printf("SRA user accepted\r\n");
233*7348b5c5SDavid van Moolenbroek 			}
234*7348b5c5SDavid van Moolenbroek 		}
235*7348b5c5SDavid van Moolenbroek 		else {
236*7348b5c5SDavid van Moolenbroek 			pk_encode(passprompt, xpassprompt, &ck);
237*7348b5c5SDavid van Moolenbroek 			Data(ap, SRA_CONTINUE, (void *)xpassprompt,
238*7348b5c5SDavid van Moolenbroek 			    XSMALL_LEN - 1);
239*7348b5c5SDavid van Moolenbroek 			if (auth_debug_mode) {
240*7348b5c5SDavid van Moolenbroek 				printf("SRA user failed\r\n");
241*7348b5c5SDavid van Moolenbroek 			}
242*7348b5c5SDavid van Moolenbroek 		}
243*7348b5c5SDavid van Moolenbroek 		return;
244*7348b5c5SDavid van Moolenbroek 
245*7348b5c5SDavid van Moolenbroek 	default:
246*7348b5c5SDavid van Moolenbroek 		if (auth_debug_mode)
247*7348b5c5SDavid van Moolenbroek 			printf("Unknown SRA option %d\r\n", data[-1]);
248*7348b5c5SDavid van Moolenbroek 	}
249*7348b5c5SDavid van Moolenbroek bad:
250*7348b5c5SDavid van Moolenbroek 	Data(ap, SRA_REJECT, 0, 0);
251*7348b5c5SDavid van Moolenbroek 	sra_valid = 0;
252*7348b5c5SDavid van Moolenbroek 	auth_finished(ap, AUTH_REJECT);
253*7348b5c5SDavid van Moolenbroek }
254*7348b5c5SDavid van Moolenbroek 
255*7348b5c5SDavid van Moolenbroek /* client received REPLY -- could be SRA KEY, CONTINUE, ACCEPT, or REJECT */
256*7348b5c5SDavid van Moolenbroek void
sra_reply(Authenticator * ap,unsigned char * data,int cnt)257*7348b5c5SDavid van Moolenbroek sra_reply(Authenticator *ap, unsigned char *data, int cnt)
258*7348b5c5SDavid van Moolenbroek {
259*7348b5c5SDavid van Moolenbroek 	char uprompt[SMALL_LEN], tuser[SMALL_LEN];
260*7348b5c5SDavid van Moolenbroek 	Session_Key skey;
261*7348b5c5SDavid van Moolenbroek 	size_t i;
262*7348b5c5SDavid van Moolenbroek 
263*7348b5c5SDavid van Moolenbroek 	if (cnt-- < 1)
264*7348b5c5SDavid van Moolenbroek 		return;
265*7348b5c5SDavid van Moolenbroek 	switch (*data++) {
266*7348b5c5SDavid van Moolenbroek 
267*7348b5c5SDavid van Moolenbroek 	case SRA_KEY:
268*7348b5c5SDavid van Moolenbroek 		/* calculate common key */
269*7348b5c5SDavid van Moolenbroek 		if (cnt < HEXKEYBYTES) {
270*7348b5c5SDavid van Moolenbroek 			if (auth_debug_mode) {
271*7348b5c5SDavid van Moolenbroek 				printf("SRA user rejected for bad PKB\r\n");
272*7348b5c5SDavid van Moolenbroek 			}
273*7348b5c5SDavid van Moolenbroek 			return;
274*7348b5c5SDavid van Moolenbroek 		}
275*7348b5c5SDavid van Moolenbroek 		memcpy(pkb, data, HEXKEYBYTES);
276*7348b5c5SDavid van Moolenbroek 		pkb[HEXKEYBYTES] = '\0';
277*7348b5c5SDavid van Moolenbroek 
278*7348b5c5SDavid van Moolenbroek 		common_key(ska, pkb, &ik, &ck);
279*7348b5c5SDavid van Moolenbroek 
280*7348b5c5SDavid van Moolenbroek 	enc_user:
281*7348b5c5SDavid van Moolenbroek 
282*7348b5c5SDavid van Moolenbroek 		/* encode user */
283*7348b5c5SDavid van Moolenbroek 		memset(tuser, 0, sizeof(tuser));
284*7348b5c5SDavid van Moolenbroek 		snprintf(uprompt, sizeof(uprompt), "User (%s): ",
285*7348b5c5SDavid van Moolenbroek 		    UserNameRequested);
286*7348b5c5SDavid van Moolenbroek 		if (telnet_gets(uprompt, tuser, SMALL_LEN - 1, 1) == NULL) {
287*7348b5c5SDavid van Moolenbroek 			printf("\n");
288*7348b5c5SDavid van Moolenbroek 			exit(1);
289*7348b5c5SDavid van Moolenbroek 		}
290*7348b5c5SDavid van Moolenbroek 		if (tuser[0] == '\n' || tuser[0] == '\r' )
291*7348b5c5SDavid van Moolenbroek 			strlcpy(user, UserNameRequested, SMALL_LEN);
292*7348b5c5SDavid van Moolenbroek 		else {
293*7348b5c5SDavid van Moolenbroek 			/* telnet_gets leaves the newline on */
294*7348b5c5SDavid van Moolenbroek 			for(i = 0; i < sizeof(tuser); i++) {
295*7348b5c5SDavid van Moolenbroek 				if (tuser[i] == '\n') {
296*7348b5c5SDavid van Moolenbroek 					tuser[i] = '\0';
297*7348b5c5SDavid van Moolenbroek 					break;
298*7348b5c5SDavid van Moolenbroek 				}
299*7348b5c5SDavid van Moolenbroek 			}
300*7348b5c5SDavid van Moolenbroek 			strlcpy(user, tuser, SMALL_LEN);
301*7348b5c5SDavid van Moolenbroek 		}
302*7348b5c5SDavid van Moolenbroek 		pk_encode(user, xuser, &ck);
303*7348b5c5SDavid van Moolenbroek 
304*7348b5c5SDavid van Moolenbroek 		/* send it off */
305*7348b5c5SDavid van Moolenbroek 		if (auth_debug_mode)
306*7348b5c5SDavid van Moolenbroek 			printf("Sent KAB(U)\r\n");
307*7348b5c5SDavid van Moolenbroek 		if (!Data(ap, SRA_USER, (void *)xuser, strlen(xuser))) {
308*7348b5c5SDavid van Moolenbroek 			if (auth_debug_mode)
309*7348b5c5SDavid van Moolenbroek 				printf("Not enough room\r\n");
310*7348b5c5SDavid van Moolenbroek 			return;
311*7348b5c5SDavid van Moolenbroek 		}
312*7348b5c5SDavid van Moolenbroek 		break;
313*7348b5c5SDavid van Moolenbroek 
314*7348b5c5SDavid van Moolenbroek 	case SRA_CONTINUE:
315*7348b5c5SDavid van Moolenbroek 		if (passwd_sent) {
316*7348b5c5SDavid van Moolenbroek 			passwd_sent = 0;
317*7348b5c5SDavid van Moolenbroek 			printf("[ SRA login failed ]\r\n");
318*7348b5c5SDavid van Moolenbroek 			goto enc_user;
319*7348b5c5SDavid van Moolenbroek 		}
320*7348b5c5SDavid van Moolenbroek 		if (cnt > XSMALL_LEN - 1) {
321*7348b5c5SDavid van Moolenbroek 			break;
322*7348b5c5SDavid van Moolenbroek 		} else if (cnt > 0) {
323*7348b5c5SDavid van Moolenbroek 			(void)memcpy(xpassprompt, data, cnt);
324*7348b5c5SDavid van Moolenbroek 			pk_decode(xpassprompt, passprompt, &ck);
325*7348b5c5SDavid van Moolenbroek 		} else {
326*7348b5c5SDavid van Moolenbroek 			(void)strlcpy(passprompt, "Password: ", SMALL_LEN);
327*7348b5c5SDavid van Moolenbroek 		}
328*7348b5c5SDavid van Moolenbroek 		/* encode password */
329*7348b5c5SDavid van Moolenbroek 		memset(pass, 0, SMALL_LEN);
330*7348b5c5SDavid van Moolenbroek 		if (telnet_gets(passprompt, pass, SMALL_LEN - 1, 0) == NULL) {
331*7348b5c5SDavid van Moolenbroek 			printf("\n");
332*7348b5c5SDavid van Moolenbroek 			exit(1);
333*7348b5c5SDavid van Moolenbroek 		}
334*7348b5c5SDavid van Moolenbroek 		pk_encode(pass, xpass, &ck);
335*7348b5c5SDavid van Moolenbroek 		/* send it off */
336*7348b5c5SDavid van Moolenbroek 		if (auth_debug_mode)
337*7348b5c5SDavid van Moolenbroek 			printf("Sent KAB(P)\r\n");
338*7348b5c5SDavid van Moolenbroek 		if (!Data(ap, SRA_PASS, (void *)xpass, strlen(xpass))) {
339*7348b5c5SDavid van Moolenbroek 			if (auth_debug_mode)
340*7348b5c5SDavid van Moolenbroek 				printf("Not enough room\r\n");
341*7348b5c5SDavid van Moolenbroek 			return;
342*7348b5c5SDavid van Moolenbroek 		}
343*7348b5c5SDavid van Moolenbroek 		passwd_sent = 1;
344*7348b5c5SDavid van Moolenbroek 		break;
345*7348b5c5SDavid van Moolenbroek 
346*7348b5c5SDavid van Moolenbroek 	case SRA_REJECT:
347*7348b5c5SDavid van Moolenbroek 		printf("[ SRA refuses authentication ]\r\n");
348*7348b5c5SDavid van Moolenbroek 		printf("Trying plaintext login:\r\n");
349*7348b5c5SDavid van Moolenbroek 		auth_finished(0, AUTH_REJECT);
350*7348b5c5SDavid van Moolenbroek 		return;
351*7348b5c5SDavid van Moolenbroek 
352*7348b5c5SDavid van Moolenbroek 	case SRA_ACCEPT:
353*7348b5c5SDavid van Moolenbroek 		printf("[ SRA accepts you ]\r\n");
354*7348b5c5SDavid van Moolenbroek 		skey.data = ck;
355*7348b5c5SDavid van Moolenbroek 		skey.type = SK_DES;
356*7348b5c5SDavid van Moolenbroek 		skey.length = 8;
357*7348b5c5SDavid van Moolenbroek 		encrypt_session_key(&skey, 0);
358*7348b5c5SDavid van Moolenbroek 
359*7348b5c5SDavid van Moolenbroek 		auth_finished(ap, AUTH_VALID);
360*7348b5c5SDavid van Moolenbroek 		return;
361*7348b5c5SDavid van Moolenbroek 	default:
362*7348b5c5SDavid van Moolenbroek 		if (auth_debug_mode)
363*7348b5c5SDavid van Moolenbroek 			printf("Unknown SRA option %d\r\n", data[-1]);
364*7348b5c5SDavid van Moolenbroek 		return;
365*7348b5c5SDavid van Moolenbroek 	}
366*7348b5c5SDavid van Moolenbroek }
367*7348b5c5SDavid van Moolenbroek 
368*7348b5c5SDavid van Moolenbroek int
sra_status(Authenticator * ap __unused,char * name,size_t len,int level)369*7348b5c5SDavid van Moolenbroek sra_status(Authenticator *ap __unused, char *name, size_t len, int level)
370*7348b5c5SDavid van Moolenbroek {
371*7348b5c5SDavid van Moolenbroek 	if (level < AUTH_USER)
372*7348b5c5SDavid van Moolenbroek 		return level;
373*7348b5c5SDavid van Moolenbroek 	if (UserNameRequested && sra_valid) {
374*7348b5c5SDavid van Moolenbroek 		strlcpy(name, UserNameRequested, len);
375*7348b5c5SDavid van Moolenbroek 		return AUTH_VALID;
376*7348b5c5SDavid van Moolenbroek 	} else
377*7348b5c5SDavid van Moolenbroek 		return AUTH_USER;
378*7348b5c5SDavid van Moolenbroek }
379*7348b5c5SDavid van Moolenbroek 
380*7348b5c5SDavid van Moolenbroek #define	BUMP(buf, len)		while (*(buf)) { ++(buf), --(len); }
381*7348b5c5SDavid van Moolenbroek #define	ADDC(buf, len, c)	if ((len) > 0) { *(buf)++ = (c); --(len); }
382*7348b5c5SDavid van Moolenbroek 
383*7348b5c5SDavid van Moolenbroek void
sra_printsub(unsigned char * data,int cnt,unsigned char * ubuf,int buflen)384*7348b5c5SDavid van Moolenbroek sra_printsub(unsigned char *data, int cnt, unsigned char *ubuf, int buflen)
385*7348b5c5SDavid van Moolenbroek {
386*7348b5c5SDavid van Moolenbroek 	char lbuf[32], *buf = (char *)ubuf;
387*7348b5c5SDavid van Moolenbroek 	int i;
388*7348b5c5SDavid van Moolenbroek 
389*7348b5c5SDavid van Moolenbroek 	buf[buflen - 1] = '\0'; 		/* make sure its NULL terminated */
390*7348b5c5SDavid van Moolenbroek 	buflen -= 1;
391*7348b5c5SDavid van Moolenbroek 
392*7348b5c5SDavid van Moolenbroek 	switch(data[3]) {
393*7348b5c5SDavid van Moolenbroek 
394*7348b5c5SDavid van Moolenbroek 	case SRA_CONTINUE:
395*7348b5c5SDavid van Moolenbroek 		strncpy(buf, " CONTINUE ", buflen);
396*7348b5c5SDavid van Moolenbroek 		goto common;
397*7348b5c5SDavid van Moolenbroek 
398*7348b5c5SDavid van Moolenbroek 	case SRA_REJECT:		/* Rejected (reason might follow) */
399*7348b5c5SDavid van Moolenbroek 		strncpy(buf, " REJECT ", buflen);
400*7348b5c5SDavid van Moolenbroek 		goto common;
401*7348b5c5SDavid van Moolenbroek 
402*7348b5c5SDavid van Moolenbroek 	case SRA_ACCEPT:		/* Accepted (name might follow) */
403*7348b5c5SDavid van Moolenbroek 		strncpy(buf, " ACCEPT ", buflen);
404*7348b5c5SDavid van Moolenbroek 
405*7348b5c5SDavid van Moolenbroek 	common:
406*7348b5c5SDavid van Moolenbroek 		BUMP(buf, buflen);
407*7348b5c5SDavid van Moolenbroek 		if (cnt <= 4)
408*7348b5c5SDavid van Moolenbroek 			break;
409*7348b5c5SDavid van Moolenbroek 		ADDC(buf, buflen, '"');
410*7348b5c5SDavid van Moolenbroek 		for (i = 4; i < cnt; i++)
411*7348b5c5SDavid van Moolenbroek 			ADDC(buf, buflen, data[i]);
412*7348b5c5SDavid van Moolenbroek 		ADDC(buf, buflen, '"');
413*7348b5c5SDavid van Moolenbroek 		ADDC(buf, buflen, '\0');
414*7348b5c5SDavid van Moolenbroek 		break;
415*7348b5c5SDavid van Moolenbroek 
416*7348b5c5SDavid van Moolenbroek 	case SRA_KEY:			/* Authentication data follows */
417*7348b5c5SDavid van Moolenbroek 		strncpy(buf, " KEY ", buflen);
418*7348b5c5SDavid van Moolenbroek 		goto common2;
419*7348b5c5SDavid van Moolenbroek 
420*7348b5c5SDavid van Moolenbroek 	case SRA_USER:
421*7348b5c5SDavid van Moolenbroek 		strncpy(buf, " USER ", buflen);
422*7348b5c5SDavid van Moolenbroek 		goto common2;
423*7348b5c5SDavid van Moolenbroek 
424*7348b5c5SDavid van Moolenbroek 	case SRA_PASS:
425*7348b5c5SDavid van Moolenbroek 		strncpy(buf, " PASS ", buflen);
426*7348b5c5SDavid van Moolenbroek 		goto common2;
427*7348b5c5SDavid van Moolenbroek 
428*7348b5c5SDavid van Moolenbroek 	default:
429*7348b5c5SDavid van Moolenbroek 		snprintf(lbuf, sizeof(lbuf), " %d (unknown)", data[3]);
430*7348b5c5SDavid van Moolenbroek 		strncpy(buf, lbuf, buflen);
431*7348b5c5SDavid van Moolenbroek 	common2:
432*7348b5c5SDavid van Moolenbroek 		BUMP(buf, buflen);
433*7348b5c5SDavid van Moolenbroek 		for (i = 4; i < cnt; i++) {
434*7348b5c5SDavid van Moolenbroek 			snprintf(lbuf, sizeof(lbuf), " %d", data[i]);
435*7348b5c5SDavid van Moolenbroek 			strncpy(buf, lbuf, buflen);
436*7348b5c5SDavid van Moolenbroek 			BUMP(buf, buflen);
437*7348b5c5SDavid van Moolenbroek 		}
438*7348b5c5SDavid van Moolenbroek 		break;
439*7348b5c5SDavid van Moolenbroek 	}
440*7348b5c5SDavid van Moolenbroek }
441*7348b5c5SDavid van Moolenbroek 
442*7348b5c5SDavid van Moolenbroek #ifdef NOPAM
443*7348b5c5SDavid van Moolenbroek static int
isroot(const char * usr)444*7348b5c5SDavid van Moolenbroek isroot(const char *usr)
445*7348b5c5SDavid van Moolenbroek {
446*7348b5c5SDavid van Moolenbroek 	struct passwd pws, *pwd;
447*7348b5c5SDavid van Moolenbroek 	char pwbuf[1024];
448*7348b5c5SDavid van Moolenbroek 
449*7348b5c5SDavid van Moolenbroek 	if (getpwnam_r(usr, &pws, pwbuf, sizeof(pwbuf), &pwd) != 0 ||
450*7348b5c5SDavid van Moolenbroek 	    pwd == NULL)
451*7348b5c5SDavid van Moolenbroek 		return 0;
452*7348b5c5SDavid van Moolenbroek 	return (!pwd->pw_uid);
453*7348b5c5SDavid van Moolenbroek }
454*7348b5c5SDavid van Moolenbroek 
455*7348b5c5SDavid van Moolenbroek static int
rootterm(const char * ttyname)456*7348b5c5SDavid van Moolenbroek rootterm(const char *ttyname)
457*7348b5c5SDavid van Moolenbroek {
458*7348b5c5SDavid van Moolenbroek 	struct ttyent *t;
459*7348b5c5SDavid van Moolenbroek 	const char *ttyn;
460*7348b5c5SDavid van Moolenbroek 
461*7348b5c5SDavid van Moolenbroek 	ttyn = ttyname;
462*7348b5c5SDavid van Moolenbroek 	if (strncmp(ttyn, _PATH_DEV, sizeof(_PATH_DEV) - 1) == 0)
463*7348b5c5SDavid van Moolenbroek 		ttyn += sizeof(_PATH_DEV) - 1;
464*7348b5c5SDavid van Moolenbroek 
465*7348b5c5SDavid van Moolenbroek 	return ((t = getttynam(ttyn)) && t->ty_status & TTY_SECURE);
466*7348b5c5SDavid van Moolenbroek }
467*7348b5c5SDavid van Moolenbroek 
468*7348b5c5SDavid van Moolenbroek static int
check_user(char * name,const char * cred)469*7348b5c5SDavid van Moolenbroek check_user(char *name, const char *cred)
470*7348b5c5SDavid van Moolenbroek {
471*7348b5c5SDavid van Moolenbroek 	struct passwd pws, *pw;
472*7348b5c5SDavid van Moolenbroek 	char pwbuf[1024];
473*7348b5c5SDavid van Moolenbroek 	char *xpasswd, *salt;
474*7348b5c5SDavid van Moolenbroek 
475*7348b5c5SDavid van Moolenbroek 	if (isroot(name) && !rootterm(line))
476*7348b5c5SDavid van Moolenbroek 	{
477*7348b5c5SDavid van Moolenbroek 		crypt("AA", "*"); /* Waste some time to simulate success */
478*7348b5c5SDavid van Moolenbroek 		return 0;
479*7348b5c5SDavid van Moolenbroek 	}
480*7348b5c5SDavid van Moolenbroek 
481*7348b5c5SDavid van Moolenbroek 	if (getpwnam_r(name, &pws, pwbuf, sizeof(pwbuf), &pw) == 0 &&
482*7348b5c5SDavid van Moolenbroek 	    pw != NULL) {
483*7348b5c5SDavid van Moolenbroek 		if (pw->pw_shell == NULL) {
484*7348b5c5SDavid van Moolenbroek 			return 0;
485*7348b5c5SDavid van Moolenbroek 		}
486*7348b5c5SDavid van Moolenbroek 
487*7348b5c5SDavid van Moolenbroek 		salt = pw->pw_passwd;
488*7348b5c5SDavid van Moolenbroek 		xpasswd = crypt(cred, salt);
489*7348b5c5SDavid van Moolenbroek 		/* The strcmp does not catch null passwords! */
490*7348b5c5SDavid van Moolenbroek 		if (*pw->pw_passwd == '\0' || strcmp(xpasswd, pw->pw_passwd)) {
491*7348b5c5SDavid van Moolenbroek 			return 0;
492*7348b5c5SDavid van Moolenbroek 		}
493*7348b5c5SDavid van Moolenbroek 		return 1;
494*7348b5c5SDavid van Moolenbroek 	}
495*7348b5c5SDavid van Moolenbroek 	return 0;
496*7348b5c5SDavid van Moolenbroek }
497*7348b5c5SDavid van Moolenbroek #else	/* !NOPAM */
498*7348b5c5SDavid van Moolenbroek 
499*7348b5c5SDavid van Moolenbroek /*
500*7348b5c5SDavid van Moolenbroek  * The following is stolen from ftpd, which stole it from the imap-uw
501*7348b5c5SDavid van Moolenbroek  * PAM module and login.c. It is needed because we can't really
502*7348b5c5SDavid van Moolenbroek  * "converse" with the user, having already gone to the trouble of
503*7348b5c5SDavid van Moolenbroek  * getting their username and password through an encrypted channel.
504*7348b5c5SDavid van Moolenbroek  */
505*7348b5c5SDavid van Moolenbroek 
506*7348b5c5SDavid van Moolenbroek #define COPY_STRING(s) (s ? strdup(s) : NULL)
507*7348b5c5SDavid van Moolenbroek 
508*7348b5c5SDavid van Moolenbroek struct cred_t {
509*7348b5c5SDavid van Moolenbroek 	const char *uname;
510*7348b5c5SDavid van Moolenbroek 	const char *pass;
511*7348b5c5SDavid van Moolenbroek };
512*7348b5c5SDavid van Moolenbroek typedef struct cred_t cred_t;
513*7348b5c5SDavid van Moolenbroek 
514*7348b5c5SDavid van Moolenbroek static int
auth_conv(int num_msg,const struct pam_message ** msg,struct pam_response ** resp,void * appdata)515*7348b5c5SDavid van Moolenbroek auth_conv(int num_msg, const struct pam_message **msg,
516*7348b5c5SDavid van Moolenbroek     struct pam_response **resp, void *appdata)
517*7348b5c5SDavid van Moolenbroek {
518*7348b5c5SDavid van Moolenbroek 	int i;
519*7348b5c5SDavid van Moolenbroek 	cred_t *cred = appdata;
520*7348b5c5SDavid van Moolenbroek 	struct pam_response *reply = malloc(sizeof(*reply) * num_msg);
521*7348b5c5SDavid van Moolenbroek 
522*7348b5c5SDavid van Moolenbroek 	if (reply == NULL)
523*7348b5c5SDavid van Moolenbroek 		return PAM_BUF_ERR;
524*7348b5c5SDavid van Moolenbroek 
525*7348b5c5SDavid van Moolenbroek 	for (i = 0; i < num_msg; i++) {
526*7348b5c5SDavid van Moolenbroek 		switch (msg[i]->msg_style) {
527*7348b5c5SDavid van Moolenbroek 		case PAM_PROMPT_ECHO_ON:        /* assume want user name */
528*7348b5c5SDavid van Moolenbroek 			reply[i].resp_retcode = PAM_SUCCESS;
529*7348b5c5SDavid van Moolenbroek 			reply[i].resp = COPY_STRING(cred->uname);
530*7348b5c5SDavid van Moolenbroek 			/* PAM frees resp. */
531*7348b5c5SDavid van Moolenbroek 			break;
532*7348b5c5SDavid van Moolenbroek 		case PAM_PROMPT_ECHO_OFF:       /* assume want password */
533*7348b5c5SDavid van Moolenbroek 		    (void)strlcpy(passprompt, msg[i]->msg, SMALL_LEN);
534*7348b5c5SDavid van Moolenbroek 		    reply[i].resp_retcode = PAM_SUCCESS;
535*7348b5c5SDavid van Moolenbroek 		    reply[i].resp = COPY_STRING(cred->pass);
536*7348b5c5SDavid van Moolenbroek 		    /* PAM frees resp. */
537*7348b5c5SDavid van Moolenbroek 		    break;
538*7348b5c5SDavid van Moolenbroek 		case PAM_TEXT_INFO:
539*7348b5c5SDavid van Moolenbroek 		case PAM_ERROR_MSG:
540*7348b5c5SDavid van Moolenbroek 			reply[i].resp_retcode = PAM_SUCCESS;
541*7348b5c5SDavid van Moolenbroek 			reply[i].resp = NULL;
542*7348b5c5SDavid van Moolenbroek 			break;
543*7348b5c5SDavid van Moolenbroek 		default:                        /* unknown message style */
544*7348b5c5SDavid van Moolenbroek 			free(reply);
545*7348b5c5SDavid van Moolenbroek 			return PAM_CONV_ERR;
546*7348b5c5SDavid van Moolenbroek 		}
547*7348b5c5SDavid van Moolenbroek 	}
548*7348b5c5SDavid van Moolenbroek 
549*7348b5c5SDavid van Moolenbroek 	*resp = reply;
550*7348b5c5SDavid van Moolenbroek 	return PAM_SUCCESS;
551*7348b5c5SDavid van Moolenbroek }
552*7348b5c5SDavid van Moolenbroek 
553*7348b5c5SDavid van Moolenbroek /*
554*7348b5c5SDavid van Moolenbroek  * The PAM version as a side effect may put a new username in *name.
555*7348b5c5SDavid van Moolenbroek  */
556*7348b5c5SDavid van Moolenbroek static int
check_user(char * name,const char * cred)557*7348b5c5SDavid van Moolenbroek check_user(char *name, const char *cred)
558*7348b5c5SDavid van Moolenbroek {
559*7348b5c5SDavid van Moolenbroek 	pam_handle_t *pamh = NULL;
560*7348b5c5SDavid van Moolenbroek 	const void *item;
561*7348b5c5SDavid van Moolenbroek 	int rval;
562*7348b5c5SDavid van Moolenbroek 	int e;
563*7348b5c5SDavid van Moolenbroek 	cred_t auth_cred = { name, cred };
564*7348b5c5SDavid van Moolenbroek 	struct pam_conv conv = { &auth_conv, &auth_cred };
565*7348b5c5SDavid van Moolenbroek 
566*7348b5c5SDavid van Moolenbroek 	e = pam_start("telnetd", name, &conv, &pamh);
567*7348b5c5SDavid van Moolenbroek 	if (e != PAM_SUCCESS) {
568*7348b5c5SDavid van Moolenbroek 		syslog(LOG_ERR, "pam_start: %s", pam_strerror(pamh, e));
569*7348b5c5SDavid van Moolenbroek 		return 0;
570*7348b5c5SDavid van Moolenbroek 	}
571*7348b5c5SDavid van Moolenbroek 
572*7348b5c5SDavid van Moolenbroek #if 0 /* Where can we find this value? */
573*7348b5c5SDavid van Moolenbroek 	e = pam_set_item(pamh, PAM_RHOST, remotehost);
574*7348b5c5SDavid van Moolenbroek 	if (e != PAM_SUCCESS) {
575*7348b5c5SDavid van Moolenbroek 		syslog(LOG_ERR, "pam_set_item(PAM_RHOST): %s",
576*7348b5c5SDavid van Moolenbroek 			pam_strerror(pamh, e));
577*7348b5c5SDavid van Moolenbroek 		return 0;
578*7348b5c5SDavid van Moolenbroek 	}
579*7348b5c5SDavid van Moolenbroek #endif
580*7348b5c5SDavid van Moolenbroek 
581*7348b5c5SDavid van Moolenbroek 	e = pam_authenticate(pamh, 0);
582*7348b5c5SDavid van Moolenbroek 	switch (e) {
583*7348b5c5SDavid van Moolenbroek 	case PAM_SUCCESS:
584*7348b5c5SDavid van Moolenbroek 		/*
585*7348b5c5SDavid van Moolenbroek 		 * With PAM we support the concept of a "template"
586*7348b5c5SDavid van Moolenbroek 		 * user.  The user enters a login name which is
587*7348b5c5SDavid van Moolenbroek 		 * authenticated by PAM, usually via a remote service
588*7348b5c5SDavid van Moolenbroek 		 * such as RADIUS or TACACS+.  If authentication
589*7348b5c5SDavid van Moolenbroek 		 * succeeds, a different but related "template" name
590*7348b5c5SDavid van Moolenbroek 		 * is used for setting the credentials, shell, and
591*7348b5c5SDavid van Moolenbroek 		 * home directory.  The name the user enters need only
592*7348b5c5SDavid van Moolenbroek 		 * exist on the remote authentication server, but the
593*7348b5c5SDavid van Moolenbroek 		 * template name must be present in the local password
594*7348b5c5SDavid van Moolenbroek 		 * database.
595*7348b5c5SDavid van Moolenbroek 		 *
596*7348b5c5SDavid van Moolenbroek 		 * This is supported by two various mechanisms in the
597*7348b5c5SDavid van Moolenbroek 		 * individual modules.  However, from the application's
598*7348b5c5SDavid van Moolenbroek 		 * point of view, the template user is always passed
599*7348b5c5SDavid van Moolenbroek 		 * back as a changed value of the PAM_USER item.
600*7348b5c5SDavid van Moolenbroek 		 */
601*7348b5c5SDavid van Moolenbroek 		if ((e = pam_get_item(pamh, PAM_USER, &item)) ==
602*7348b5c5SDavid van Moolenbroek 		    PAM_SUCCESS) {
603*7348b5c5SDavid van Moolenbroek 			strlcpy(name, item, SMALL_LEN);
604*7348b5c5SDavid van Moolenbroek 		} else
605*7348b5c5SDavid van Moolenbroek 			syslog(LOG_ERR, "Couldn't get PAM_USER: %s",
606*7348b5c5SDavid van Moolenbroek 			pam_strerror(pamh, e));
607*7348b5c5SDavid van Moolenbroek #if 0	/* pam_securetty(8) should be used to enforce this */
608*7348b5c5SDavid van Moolenbroek 		if (isroot(name) && !rootterm(line))
609*7348b5c5SDavid van Moolenbroek 			rval = 0;
610*7348b5c5SDavid van Moolenbroek 		else
611*7348b5c5SDavid van Moolenbroek #endif
612*7348b5c5SDavid van Moolenbroek 			rval = 1;
613*7348b5c5SDavid van Moolenbroek 		break;
614*7348b5c5SDavid van Moolenbroek 
615*7348b5c5SDavid van Moolenbroek 	case PAM_AUTH_ERR:
616*7348b5c5SDavid van Moolenbroek 	case PAM_USER_UNKNOWN:
617*7348b5c5SDavid van Moolenbroek 	case PAM_MAXTRIES:
618*7348b5c5SDavid van Moolenbroek 		rval = 0;
619*7348b5c5SDavid van Moolenbroek 	break;
620*7348b5c5SDavid van Moolenbroek 
621*7348b5c5SDavid van Moolenbroek 	default:
622*7348b5c5SDavid van Moolenbroek 		syslog(LOG_ERR, "auth_pam: %s", pam_strerror(pamh, e));
623*7348b5c5SDavid van Moolenbroek 		rval = 0;
624*7348b5c5SDavid van Moolenbroek 		break;
625*7348b5c5SDavid van Moolenbroek 	}
626*7348b5c5SDavid van Moolenbroek 
627*7348b5c5SDavid van Moolenbroek 	if ((e = pam_end(pamh, e)) != PAM_SUCCESS) {
628*7348b5c5SDavid van Moolenbroek 		syslog(LOG_ERR, "pam_end: %s", pam_strerror(pamh, e));
629*7348b5c5SDavid van Moolenbroek 		rval = 0;
630*7348b5c5SDavid van Moolenbroek 	}
631*7348b5c5SDavid van Moolenbroek 	return rval;
632*7348b5c5SDavid van Moolenbroek }
633*7348b5c5SDavid van Moolenbroek 
634*7348b5c5SDavid van Moolenbroek #endif /* !NOPAM */
635*7348b5c5SDavid van Moolenbroek 
636*7348b5c5SDavid van Moolenbroek #endif /* ENCRYPTION */
637*7348b5c5SDavid van Moolenbroek #endif /* SRA */
638