1 /* S/KEY v1.1b (skeyinit.c) 2 * 3 * Authors: 4 * Neil M. Haller <nmh@thumper.bellcore.com> 5 * Philip R. Karn <karn@chicago.qualcomm.com> 6 * John S. Walden <jsw@thumper.bellcore.com> 7 * Scott Chasin <chasin@crimelab.com> 8 * 9 * S/KEY initialization and seed update 10 * 11 * $Id: skeyinit.c,v 1.4 1994/05/30 04:52:26 deraadt Exp $ 12 */ 13 14 #include <sys/param.h> 15 #include <sys/time.h> 16 #include <sys/resource.h> 17 18 #include <stdio.h> 19 #include <string.h> 20 #include <pwd.h> 21 #include <unistd.h> 22 #include <time.h> 23 24 #include "skey.h" 25 26 #define NAMELEN 2 27 28 int skeylookup __ARGS((struct skey * mp, char *name)); 29 30 main(argc, argv) 31 int argc; 32 char *argv[]; 33 { 34 int rval, n, nn, i, defaultsetup, l; 35 time_t now; 36 char hostname[MAXHOSTNAMELEN]; 37 char seed[18], tmp[80], key[8], defaultseed[17]; 38 char passwd[256], passwd2[256], tbuf[27], buf[60]; 39 char lastc, me[80], user[8], *salt, *p, *pw; 40 struct skey skey; 41 struct passwd *pp; 42 struct tm *tm; 43 extern int optind; 44 extern char *optarg; 45 46 time(&now); 47 tm = localtime(&now); 48 strftime(tbuf, sizeof(tbuf), "%M%j", tm); 49 50 if (gethostname(hostname, sizeof(hostname)) < 0) 51 err(1, "gethostname"); 52 strncpy(defaultseed, hostname, sizeof(defaultseed)- 1); 53 defaultseed[4] = '\0'; 54 strncat(defaultseed, tbuf, sizeof(defaultseed) - 5); 55 56 if ((pp = getpwuid(getuid())) == NULL) 57 err(1, "no user with uid %d", getuid()); 58 strcpy(me, pp->pw_name); 59 60 if ((pp = getpwnam(me)) == NULL) 61 err(1, "Who are you?"); 62 63 defaultsetup = 1; 64 if (argc > 1) { 65 if (strcmp("-s", argv[1]) == 0) 66 defaultsetup = 0; 67 else 68 pp = getpwnam(argv[1]); 69 70 if (argc > 2) 71 pp = getpwnam(argv[2]); 72 } 73 if (pp == NULL) { 74 err(1, "User unknown"); 75 } 76 if (strcmp(pp->pw_name, me) != 0) { 77 if (getuid() != 0) { 78 /* Only root can change other's passwds */ 79 printf("Permission denied.\n"); 80 exit(1); 81 } 82 } 83 salt = pp->pw_passwd; 84 85 setpriority(PRIO_PROCESS, 0, -4); 86 87 if (getuid() != 0) { 88 setpriority(PRIO_PROCESS, 0, -4); 89 90 pw = getpass("Password:"); 91 p = crypt(pw, salt); 92 93 setpriority(PRIO_PROCESS, 0, 0); 94 95 if (pp && strcmp(p, pp->pw_passwd)) { 96 printf("Password incorrect.\n"); 97 exit(1); 98 } 99 } 100 rval = skeylookup(&skey, pp->pw_name); 101 switch (rval) { 102 case -1: 103 err(1, "cannot open database"); 104 case 0: 105 printf("[Updating %s]\n", pp->pw_name); 106 printf("Old key: %s\n", skey.seed); 107 108 /* 109 * lets be nice if they have a skey.seed that 110 * ends in 0-8 just add one 111 */ 112 l = strlen(skey.seed); 113 if (l > 0) { 114 lastc = skey.seed[l - 1]; 115 if (isdigit(lastc) && lastc != '9') { 116 strcpy(defaultseed, skey.seed); 117 defaultseed[l - 1] = lastc + 1; 118 } 119 if (isdigit(lastc) && lastc == '9' && l < 16) { 120 strcpy(defaultseed, skey.seed); 121 defaultseed[l - 1] = '0'; 122 defaultseed[l] = '0'; 123 defaultseed[l + 1] = '\0'; 124 } 125 } 126 break; 127 case 1: 128 printf("[Adding %s]\n", pp->pw_name); 129 break; 130 } 131 n = 99; 132 133 if (!defaultsetup) { 134 printf("You need the 6 english words generated from the \"key\" command.\n"); 135 for (i = 0;; i++) { 136 if (i >= 2) 137 exit(1); 138 printf("Enter sequence count from 1 to 10000: "); 139 fgets(tmp, sizeof(tmp), stdin); 140 n = atoi(tmp); 141 if (n > 0 && n < 10000) 142 break; /* Valid range */ 143 printf("\n Error: Count must be > 0 and < 10000\n"); 144 } 145 } 146 if (!defaultsetup) { 147 printf("Enter new key [default %s]: ", defaultseed); 148 fflush(stdout); 149 fgets(seed, sizeof(seed), stdin); 150 rip(seed); 151 if (strlen(seed) > 16) { 152 printf("Notice: Seed truncated to 16 characters.\n"); 153 seed[16] = '\0'; 154 } 155 if (seed[0] == '\0') 156 strcpy(seed, defaultseed); 157 158 for (i = 0;; i++) { 159 if (i >= 2) 160 exit(1); 161 162 printf("s/key %d %s\ns/key access password: ", n, seed); 163 fgets(tmp, sizeof(tmp), stdin); 164 rip(tmp); 165 backspace(tmp); 166 167 if (tmp[0] == '?') { 168 printf("Enter 6 English words from secure S/Key calculation.\n"); 169 continue; 170 } 171 if (tmp[0] == '\0') { 172 exit(1); 173 } 174 if (etob(key, tmp) == 1 || atob8(key, tmp) == 0) 175 break; /* Valid format */ 176 printf("Invalid format - try again with 6 English words.\n"); 177 } 178 } else { 179 /* Get user's secret password */ 180 for (i = 0;; i++) { 181 if (i >= 2) 182 exit(1); 183 184 printf("Enter secret password: "); 185 readpass(passwd, sizeof(passwd)); 186 if (passwd[0] == '\0') 187 exit(1); 188 189 printf("Again secret password: "); 190 readpass(passwd2, sizeof(passwd)); 191 if (passwd2[0] == '\0') 192 exit(1); 193 194 if (strlen(passwd) < 4 && strlen(passwd2) < 4) 195 err(1, "Your password must be longer"); 196 if (strcmp(passwd, passwd2) == 0) 197 break; 198 199 printf("Passwords do not match.\n"); 200 } 201 strcpy(seed, defaultseed); 202 203 /* Crunch seed and password into starting key */ 204 if (keycrunch(key, seed, passwd) != 0) 205 err(2, "key crunch failed"); 206 nn = n; 207 while (nn-- != 0) 208 f(key); 209 } 210 time(&now); 211 tm = localtime(&now); 212 strftime(tbuf, sizeof(tbuf), " %b %d,%Y %T", tm); 213 214 skey.val = (char *)malloc(16 + 1); 215 216 btoa8(skey.val, key); 217 218 fprintf(skey.keyfile, "%s %04d %-16s %s %-21s\n", pp->pw_name, n, 219 seed, skey.val, tbuf); 220 fclose(skey.keyfile); 221 printf("ID %s s/key is %d %s\n", pp->pw_name, n, seed); 222 printf("Next login password: %s\n", btoe(buf, key)); 223 #ifdef HEXIN 224 printf("%s\n", put8(buf, key)); 225 #endif 226 227 exit(1); 228 } 229