1 /* $NetBSD: openpam_borrow_cred.c,v 1.3 2017/05/06 19:50:09 christos Exp $ */ 2 3 /*- 4 * Copyright (c) 2002-2003 Networks Associates Technology, Inc. 5 * Copyright (c) 2004-2011 Dag-Erling Smørgrav 6 * All rights reserved. 7 * 8 * This software was developed for the FreeBSD Project by ThinkSec AS and 9 * Network Associates Laboratories, the Security Research Division of 10 * Network Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 11 * ("CBOSS"), as part of the DARPA CHATS research program. 12 * 13 * Redistribution and use in source and binary forms, with or without 14 * modification, are permitted provided that the following conditions 15 * are met: 16 * 1. Redistributions of source code must retain the above copyright 17 * notice, this list of conditions and the following disclaimer. 18 * 2. Redistributions in binary form must reproduce the above copyright 19 * notice, this list of conditions and the following disclaimer in the 20 * documentation and/or other materials provided with the distribution. 21 * 3. The name of the author may not be used to endorse or promote 22 * products derived from this software without specific prior written 23 * permission. 24 * 25 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 28 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 35 * SUCH DAMAGE. 36 * 37 * $OpenPAM: openpam_borrow_cred.c 938 2017-04-30 21:34:42Z des $ 38 */ 39 40 #ifdef HAVE_CONFIG_H 41 # include "config.h" 42 #endif 43 44 #include <sys/cdefs.h> 45 __RCSID("$NetBSD: openpam_borrow_cred.c,v 1.3 2017/05/06 19:50:09 christos Exp $"); 46 47 #include <sys/param.h> 48 49 #include <grp.h> 50 #include <limits.h> 51 #include <pwd.h> 52 #include <stdlib.h> 53 #include <unistd.h> 54 55 #include <security/pam_appl.h> 56 57 #include "openpam_impl.h" 58 #include "openpam_cred.h" 59 60 /* 61 * OpenPAM extension 62 * 63 * Temporarily borrow user credentials 64 */ 65 66 int 67 openpam_borrow_cred(pam_handle_t *pamh, 68 const struct passwd *pwd) 69 { 70 struct pam_saved_cred *scred; 71 const void *scredp; 72 int r; 73 74 ENTERI(pwd->pw_uid); 75 r = pam_get_data(pamh, PAM_SAVED_CRED, &scredp); 76 if (r == PAM_SUCCESS && scredp != NULL) { 77 openpam_log(PAM_LOG_LIBDEBUG, 78 "already operating under borrowed credentials"); 79 RETURNC(PAM_SYSTEM_ERR); 80 } 81 if (geteuid() != 0 && geteuid() != pwd->pw_uid) { 82 openpam_log(PAM_LOG_LIBDEBUG, "called with non-zero euid: %d", 83 (int)geteuid()); 84 RETURNC(PAM_PERM_DENIED); 85 } 86 scred = calloc((size_t)1, sizeof *scred); 87 if (scred == NULL) 88 RETURNC(PAM_BUF_ERR); 89 scred->euid = geteuid(); 90 scred->egid = getegid(); 91 r = getgroups(NGROUPS_MAX, scred->groups); 92 if (r < 0) { 93 FREE(scred); 94 RETURNC(PAM_SYSTEM_ERR); 95 } 96 scred->ngroups = r; 97 r = pam_set_data(pamh, PAM_SAVED_CRED, scred, &openpam_free_data); 98 if (r != PAM_SUCCESS) { 99 FREE(scred); 100 RETURNC(r); 101 } 102 if (geteuid() == pwd->pw_uid) 103 RETURNC(PAM_SUCCESS); 104 if (initgroups(pwd->pw_name, pwd->pw_gid) < 0 || 105 setegid(pwd->pw_gid) < 0 || seteuid(pwd->pw_uid) < 0) { 106 openpam_restore_cred(pamh); 107 RETURNC(PAM_SYSTEM_ERR); 108 } 109 RETURNC(PAM_SUCCESS); 110 } 111 112 /* 113 * Error codes: 114 * 115 * =pam_set_data 116 * PAM_SYSTEM_ERR 117 * PAM_BUF_ERR 118 * PAM_PERM_DENIED 119 */ 120 121 /** 122 * The =openpam_borrow_cred function saves the current credentials and 123 * switches to those of the user specified by its =pwd argument. 124 * The affected credentials are the effective UID, the effective GID, and 125 * the group access list. 126 * The original credentials can be restored using =openpam_restore_cred. 127 * 128 * >setegid 2 129 * >seteuid 2 130 * >setgroups 2 131 */ 132