10Sstevel@tonic-gate /* 20Sstevel@tonic-gate * CDDL HEADER START 30Sstevel@tonic-gate * 40Sstevel@tonic-gate * The contents of this file are subject to the terms of the 52515Sas145665 * Common Development and Distribution License (the "License"). 62515Sas145665 * You may not use this file except in compliance with the License. 70Sstevel@tonic-gate * 80Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 90Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 100Sstevel@tonic-gate * See the License for the specific language governing permissions 110Sstevel@tonic-gate * and limitations under the License. 120Sstevel@tonic-gate * 130Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 140Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 150Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 160Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 170Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 180Sstevel@tonic-gate * 190Sstevel@tonic-gate * CDDL HEADER END 200Sstevel@tonic-gate */ 21*7688SAaron.Zang@Sun.COM 220Sstevel@tonic-gate /* 236646Srz201010 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 240Sstevel@tonic-gate * Use is subject to license terms. 250Sstevel@tonic-gate */ 260Sstevel@tonic-gate 270Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 280Sstevel@tonic-gate /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */ 290Sstevel@tonic-gate /* All Rights Reserved */ 300Sstevel@tonic-gate 310Sstevel@tonic-gate /* 320Sstevel@tonic-gate * University Copyright- Copyright (c) 1982, 1986, 1988 330Sstevel@tonic-gate * The Regents of the University of California 340Sstevel@tonic-gate * All Rights Reserved 350Sstevel@tonic-gate * 360Sstevel@tonic-gate * University Acknowledgment- Portions of this document are derived from 370Sstevel@tonic-gate * software developed by the University of California, Berkeley, and its 380Sstevel@tonic-gate * contributors. 390Sstevel@tonic-gate */ 400Sstevel@tonic-gate 410Sstevel@tonic-gate /* Copyright (c) 1987, 1988 Microsoft Corporation */ 420Sstevel@tonic-gate /* All Rights Reserved */ 430Sstevel@tonic-gate 440Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 450Sstevel@tonic-gate 460Sstevel@tonic-gate /* 470Sstevel@tonic-gate * For a complete reference to login(1), see the manual page. However, 480Sstevel@tonic-gate * login has accreted some intentionally undocumented options, which are 490Sstevel@tonic-gate * explained here: 500Sstevel@tonic-gate * 510Sstevel@tonic-gate * -a: This legacy flag appears to be unused. 520Sstevel@tonic-gate * 530Sstevel@tonic-gate * -f <username>: This flag was introduced by PSARC 1995/039 in support 540Sstevel@tonic-gate * of Kerberos. But it's not used by Sun's Kerberos implementation. 550Sstevel@tonic-gate * It is however employed by zlogin(1), since it allows one to tell 560Sstevel@tonic-gate * login: "This user is authenticated." In the case of zlogin that's 570Sstevel@tonic-gate * true because the zone always trusts the global zone. 580Sstevel@tonic-gate * 590Sstevel@tonic-gate * -z <zonename>: This flag is passed to login when zlogin(1) executes a 600Sstevel@tonic-gate * zone login. This tells login(1) to skip it's normal CONSOLE check 610Sstevel@tonic-gate * (i.e. that the root login must be on /dev/console) and tells us the 625331Samw * name of the zone from which the login is occurring. 630Sstevel@tonic-gate */ 640Sstevel@tonic-gate 650Sstevel@tonic-gate #include <sys/types.h> 660Sstevel@tonic-gate #include <sys/param.h> 670Sstevel@tonic-gate #include <unistd.h> /* For logfile locking */ 680Sstevel@tonic-gate #include <signal.h> 690Sstevel@tonic-gate #include <stdio.h> 700Sstevel@tonic-gate #include <sys/stat.h> 710Sstevel@tonic-gate #include <string.h> 720Sstevel@tonic-gate #include <deflt.h> 730Sstevel@tonic-gate #include <grp.h> 740Sstevel@tonic-gate #include <fcntl.h> 750Sstevel@tonic-gate #include <lastlog.h> 760Sstevel@tonic-gate #include <termio.h> 770Sstevel@tonic-gate #include <utmpx.h> 780Sstevel@tonic-gate #include <stdlib.h> 790Sstevel@tonic-gate #include <wait.h> 800Sstevel@tonic-gate #include <errno.h> 810Sstevel@tonic-gate #include <ctype.h> 820Sstevel@tonic-gate #include <syslog.h> 830Sstevel@tonic-gate #include <ulimit.h> 840Sstevel@tonic-gate #include <libgen.h> 850Sstevel@tonic-gate #include <pwd.h> 860Sstevel@tonic-gate #include <security/pam_appl.h> 870Sstevel@tonic-gate #include <strings.h> 880Sstevel@tonic-gate #include <libdevinfo.h> 890Sstevel@tonic-gate #include <zone.h> 900Sstevel@tonic-gate #include "login_audit.h" 910Sstevel@tonic-gate 920Sstevel@tonic-gate #include <krb5_repository.h> 930Sstevel@tonic-gate /* 940Sstevel@tonic-gate * 950Sstevel@tonic-gate * *** Defines, Macros, and String Constants *** 960Sstevel@tonic-gate * 970Sstevel@tonic-gate * 980Sstevel@tonic-gate */ 990Sstevel@tonic-gate 1000Sstevel@tonic-gate #define ISSUEFILE "/etc/issue" /* file to print before prompt */ 1010Sstevel@tonic-gate #define NOLOGIN "/etc/nologin" /* file to lock users out during shutdown */ 1020Sstevel@tonic-gate 1030Sstevel@tonic-gate /* 1040Sstevel@tonic-gate * These need to be defined for UTMPX management. 1050Sstevel@tonic-gate * If we add in the utility functions later, we 1060Sstevel@tonic-gate * can remove them. 1070Sstevel@tonic-gate */ 1080Sstevel@tonic-gate #define __UPDATE_ENTRY 1 1090Sstevel@tonic-gate #define __LOGIN 2 1100Sstevel@tonic-gate 1110Sstevel@tonic-gate /* 1120Sstevel@tonic-gate * Intervals to sleep after failed login 1130Sstevel@tonic-gate */ 1140Sstevel@tonic-gate #ifndef SLEEPTIME 1150Sstevel@tonic-gate #define SLEEPTIME 4 /* sleeptime before login incorrect msg */ 1160Sstevel@tonic-gate #endif 1170Sstevel@tonic-gate static int Sleeptime = SLEEPTIME; 1180Sstevel@tonic-gate 1190Sstevel@tonic-gate /* 1200Sstevel@tonic-gate * seconds login disabled after allowable number of unsuccessful attempts 1210Sstevel@tonic-gate */ 1220Sstevel@tonic-gate #ifndef DISABLETIME 1230Sstevel@tonic-gate #define DISABLETIME 20 1240Sstevel@tonic-gate #endif 1250Sstevel@tonic-gate static int Disabletime = DISABLETIME; 1260Sstevel@tonic-gate 1270Sstevel@tonic-gate #define MAXTRYS 5 1280Sstevel@tonic-gate 1290Sstevel@tonic-gate static int retry = MAXTRYS; 1300Sstevel@tonic-gate 1310Sstevel@tonic-gate /* 1320Sstevel@tonic-gate * Login logging support 1330Sstevel@tonic-gate */ 1340Sstevel@tonic-gate #define LOGINLOG "/var/adm/loginlog" /* login log file */ 1350Sstevel@tonic-gate #define LNAME_SIZE 20 /* size of logged logname */ 1360Sstevel@tonic-gate #define TTYN_SIZE 15 /* size of logged tty name */ 1370Sstevel@tonic-gate #define TIME_SIZE 30 /* size of logged time string */ 1380Sstevel@tonic-gate #define ENT_SIZE (LNAME_SIZE + TTYN_SIZE + TIME_SIZE + 3) 1390Sstevel@tonic-gate #define L_WAITTIME 5 /* waittime for log file to unlock */ 1400Sstevel@tonic-gate #define LOGTRYS 10 /* depth of 'try' logging */ 1410Sstevel@tonic-gate 1420Sstevel@tonic-gate /* 1430Sstevel@tonic-gate * String manipulation macros: SCPYN, SCPYL, EQN and ENVSTRNCAT 1440Sstevel@tonic-gate * SCPYL is the safer version of SCPYN 1450Sstevel@tonic-gate */ 1460Sstevel@tonic-gate #define SCPYL(a, b) (void) strlcpy(a, b, sizeof (a)) 1470Sstevel@tonic-gate #define SCPYN(a, b) (void) strncpy(a, b, sizeof (a)) 1480Sstevel@tonic-gate #define EQN(a, b) (strncmp(a, b, sizeof (a)-1) == 0) 1490Sstevel@tonic-gate #define ENVSTRNCAT(to, from) {int deflen; deflen = strlen(to); \ 1500Sstevel@tonic-gate (void) strncpy((to)+ deflen, (from), sizeof (to) - (1 + deflen)); } 1510Sstevel@tonic-gate 1520Sstevel@tonic-gate /* 1530Sstevel@tonic-gate * Other macros 1540Sstevel@tonic-gate */ 1550Sstevel@tonic-gate #define NMAX sizeof (((struct utmpx *)0)->ut_name) 1560Sstevel@tonic-gate #define HMAX sizeof (((struct utmpx *)0)->ut_host) 1570Sstevel@tonic-gate #define min(a, b) (((a) < (b)) ? (a) : (b)) 1580Sstevel@tonic-gate 1590Sstevel@tonic-gate /* 1600Sstevel@tonic-gate * Various useful files and string constants 1610Sstevel@tonic-gate */ 1620Sstevel@tonic-gate #define SHELL "/usr/bin/sh" 1630Sstevel@tonic-gate #define SHELL2 "/sbin/sh" 1640Sstevel@tonic-gate #define SUBLOGIN "<!sublogin>" 1650Sstevel@tonic-gate #define LASTLOG "/var/adm/lastlog" 1660Sstevel@tonic-gate #define PROG_NAME "login" 1670Sstevel@tonic-gate #define HUSHLOGIN ".hushlogin" 1680Sstevel@tonic-gate 1690Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 1700Sstevel@tonic-gate /* 1710Sstevel@tonic-gate * Array and Buffer sizes 1720Sstevel@tonic-gate */ 1730Sstevel@tonic-gate #define PBUFSIZE 8 /* max significant characters in a password */ 1740Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 1750Sstevel@tonic-gate #define MAXARGS 63 /* change value below if changing this */ 1760Sstevel@tonic-gate #define MAXARGSWIDTH 2 /* log10(MAXARGS) */ 1770Sstevel@tonic-gate #define MAXENV 1024 1780Sstevel@tonic-gate #define MAXLINE 2048 1790Sstevel@tonic-gate 1800Sstevel@tonic-gate /* 1810Sstevel@tonic-gate * Miscellaneous constants 1820Sstevel@tonic-gate */ 1830Sstevel@tonic-gate #define ROOTUID 0 1840Sstevel@tonic-gate #define ERROR 1 1850Sstevel@tonic-gate #define OK 0 1860Sstevel@tonic-gate #define LOG_ERROR 1 1870Sstevel@tonic-gate #define DONT_LOG_ERROR 0 1880Sstevel@tonic-gate #define TRUE 1 1890Sstevel@tonic-gate #define FALSE 0 1900Sstevel@tonic-gate 1910Sstevel@tonic-gate /* 1920Sstevel@tonic-gate * Counters for counting the number of failed login attempts 1930Sstevel@tonic-gate */ 1940Sstevel@tonic-gate static int trys = 0; 1950Sstevel@tonic-gate static int count = 1; 1960Sstevel@tonic-gate 1970Sstevel@tonic-gate /* 1980Sstevel@tonic-gate * error value for login_exit() audit output (0 == no audit record) 1990Sstevel@tonic-gate */ 2000Sstevel@tonic-gate static int audit_error = 0; 2010Sstevel@tonic-gate 2020Sstevel@tonic-gate /* 2030Sstevel@tonic-gate * Externs a plenty 2040Sstevel@tonic-gate */ 2050Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 2060Sstevel@tonic-gate extern int getsecretkey(); 2070Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 2080Sstevel@tonic-gate 2090Sstevel@tonic-gate /* 2100Sstevel@tonic-gate * The current user name 2110Sstevel@tonic-gate */ 2120Sstevel@tonic-gate static char user_name[NMAX]; 2130Sstevel@tonic-gate static char minusnam[16] = "-"; 2140Sstevel@tonic-gate 2150Sstevel@tonic-gate /* 2166646Srz201010 * login_pid, used to find utmpx entry to update. 2176646Srz201010 */ 2186646Srz201010 static pid_t login_pid; 2196646Srz201010 2206646Srz201010 /* 2210Sstevel@tonic-gate * locale environments to be passed to shells. 2220Sstevel@tonic-gate */ 2230Sstevel@tonic-gate static char *localeenv[] = { 2240Sstevel@tonic-gate "LANG", 2250Sstevel@tonic-gate "LC_CTYPE", "LC_NUMERIC", "LC_TIME", "LC_COLLATE", 2260Sstevel@tonic-gate "LC_MONETARY", "LC_MESSAGES", "LC_ALL", 0}; 2270Sstevel@tonic-gate static int locale_envmatch(char *, char *); 2280Sstevel@tonic-gate 2290Sstevel@tonic-gate /* 2300Sstevel@tonic-gate * Environment variable support 2310Sstevel@tonic-gate */ 2320Sstevel@tonic-gate static char shell[256] = { "SHELL=" }; 2330Sstevel@tonic-gate static char home[MAXPATHLEN] = { "HOME=" }; 2340Sstevel@tonic-gate static char term[64] = { "TERM=" }; 2350Sstevel@tonic-gate static char logname[30] = { "LOGNAME=" }; 2360Sstevel@tonic-gate static char timez[100] = { "TZ=" }; 2370Sstevel@tonic-gate static char hertz[10] = { "HZ=" }; 2380Sstevel@tonic-gate static char path[MAXPATHLEN] = { "PATH=" }; 2390Sstevel@tonic-gate static char *newenv[10+MAXARGS] = 2400Sstevel@tonic-gate {home, path, logname, hertz, term, 0, 0}; 2410Sstevel@tonic-gate static char **envinit = newenv; 2420Sstevel@tonic-gate static int basicenv; 2430Sstevel@tonic-gate static char *zero = (char *)0; 2440Sstevel@tonic-gate static char **envp; 2450Sstevel@tonic-gate #ifndef NO_MAIL 2460Sstevel@tonic-gate static char mail[30] = { "MAIL=/var/mail/" }; 2470Sstevel@tonic-gate #endif 2480Sstevel@tonic-gate extern char **environ; 2490Sstevel@tonic-gate static char inputline[MAXLINE]; 2500Sstevel@tonic-gate 2510Sstevel@tonic-gate #define MAX_ID_LEN 256 2520Sstevel@tonic-gate #define MAX_REPOSITORY_LEN 256 2530Sstevel@tonic-gate #define MAX_PAMSERVICE_LEN 256 2540Sstevel@tonic-gate 2550Sstevel@tonic-gate static char identity[MAX_ID_LEN]; 2560Sstevel@tonic-gate static char repository[MAX_REPOSITORY_LEN]; 2570Sstevel@tonic-gate static char progname[MAX_PAMSERVICE_LEN]; 2580Sstevel@tonic-gate 2590Sstevel@tonic-gate 2600Sstevel@tonic-gate /* 2610Sstevel@tonic-gate * Strings used to prompt the user. 2620Sstevel@tonic-gate */ 2630Sstevel@tonic-gate static char loginmsg[] = "login: "; 2640Sstevel@tonic-gate static char passwdmsg[] = "Password:"; 2650Sstevel@tonic-gate static char incorrectmsg[] = "Login incorrect\n"; 2660Sstevel@tonic-gate 2670Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 2680Sstevel@tonic-gate /* 2690Sstevel@tonic-gate * Password file support 2700Sstevel@tonic-gate */ 2710Sstevel@tonic-gate static struct passwd *pwd = NULL; 2720Sstevel@tonic-gate static char remote_host[HMAX]; 2730Sstevel@tonic-gate static char zone_name[ZONENAME_MAX]; 2740Sstevel@tonic-gate 2750Sstevel@tonic-gate /* 2760Sstevel@tonic-gate * Illegal passwd entries. 2770Sstevel@tonic-gate */ 2784321Scasper static struct passwd nouser = { "", "no:password", (uid_t)-1 }; 2790Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 2800Sstevel@tonic-gate 2810Sstevel@tonic-gate /* 2820Sstevel@tonic-gate * Log file support 2830Sstevel@tonic-gate */ 2840Sstevel@tonic-gate static char *log_entry[LOGTRYS]; 2850Sstevel@tonic-gate static int writelog = 0; 2860Sstevel@tonic-gate static int lastlogok = 0; 2870Sstevel@tonic-gate static struct lastlog ll; 2880Sstevel@tonic-gate static int dosyslog = 0; 2890Sstevel@tonic-gate static int flogin = MAXTRYS; /* flag for SYSLOG_FAILED_LOGINS */ 2900Sstevel@tonic-gate 2910Sstevel@tonic-gate /* 2920Sstevel@tonic-gate * Default file toggles 2930Sstevel@tonic-gate */ 2940Sstevel@tonic-gate static char *Pndefault = "/etc/default/login"; 2950Sstevel@tonic-gate static char *Altshell = NULL; 2960Sstevel@tonic-gate static char *Console = NULL; 2970Sstevel@tonic-gate static int Passreqflag = 0; 2980Sstevel@tonic-gate 2990Sstevel@tonic-gate #define DEFUMASK 022 3000Sstevel@tonic-gate static mode_t Umask = DEFUMASK; 3010Sstevel@tonic-gate static char *Def_tz = NULL; 3020Sstevel@tonic-gate static char *tmp_tz = NULL; 3030Sstevel@tonic-gate static char *Def_hertz = NULL; 3040Sstevel@tonic-gate #define SET_FSIZ 2 /* ulimit() command arg */ 3050Sstevel@tonic-gate static long Def_ulimit = 0; 3060Sstevel@tonic-gate #define MAX_TIMEOUT (15 * 60) 3070Sstevel@tonic-gate #define DEF_TIMEOUT (5 * 60) 3080Sstevel@tonic-gate static unsigned Def_timeout = DEF_TIMEOUT; 3090Sstevel@tonic-gate static char *Def_path = NULL; 3100Sstevel@tonic-gate static char *Def_supath = NULL; 3110Sstevel@tonic-gate #define DEF_PATH "/usr/bin:" /* same as PATH */ 3120Sstevel@tonic-gate #define DEF_SUPATH "/usr/sbin:/usr/bin" /* same as ROOTPATH */ 3130Sstevel@tonic-gate 3140Sstevel@tonic-gate /* 3150Sstevel@tonic-gate * Defaults for updating expired passwords 3160Sstevel@tonic-gate */ 3170Sstevel@tonic-gate #define DEF_ATTEMPTS 3 3180Sstevel@tonic-gate 3190Sstevel@tonic-gate /* 3200Sstevel@tonic-gate * ttyprompt will point to the environment variable TTYPROMPT. 3210Sstevel@tonic-gate * TTYPROMPT is set by ttymon if ttymon already wrote out the prompt. 3220Sstevel@tonic-gate */ 3230Sstevel@tonic-gate static char *ttyprompt = NULL; 3240Sstevel@tonic-gate static char *ttyn = NULL; 3250Sstevel@tonic-gate 3260Sstevel@tonic-gate /* 3270Sstevel@tonic-gate * Pass inherited environment. Used by telnetd in support of the telnet 3280Sstevel@tonic-gate * ENVIRON option. 3290Sstevel@tonic-gate */ 3300Sstevel@tonic-gate static boolean_t pflag = B_FALSE; 3310Sstevel@tonic-gate static boolean_t uflag = B_FALSE; 3320Sstevel@tonic-gate static boolean_t Rflag = B_FALSE; 3330Sstevel@tonic-gate static boolean_t sflag = B_FALSE; 3340Sstevel@tonic-gate static boolean_t Uflag = B_FALSE; 3350Sstevel@tonic-gate static boolean_t tflag = B_FALSE; 3360Sstevel@tonic-gate static boolean_t hflag = B_FALSE; 3370Sstevel@tonic-gate static boolean_t rflag = B_FALSE; 3380Sstevel@tonic-gate static boolean_t zflag = B_FALSE; 3390Sstevel@tonic-gate 3400Sstevel@tonic-gate /* 3410Sstevel@tonic-gate * Remote login support 3420Sstevel@tonic-gate */ 3430Sstevel@tonic-gate static char rusername[NMAX+1], lusername[NMAX+1]; 3440Sstevel@tonic-gate static char terminal[MAXPATHLEN]; 3450Sstevel@tonic-gate 3460Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 3470Sstevel@tonic-gate /* 3480Sstevel@tonic-gate * Pre-authentication flag support 3490Sstevel@tonic-gate */ 3500Sstevel@tonic-gate static int fflag; 3510Sstevel@tonic-gate 3520Sstevel@tonic-gate static char ** getargs(char *); 3530Sstevel@tonic-gate 3540Sstevel@tonic-gate static int login_conv(int, struct pam_message **, 3550Sstevel@tonic-gate struct pam_response **, void *); 3560Sstevel@tonic-gate 3570Sstevel@tonic-gate static struct pam_conv pam_conv = {login_conv, NULL}; 3580Sstevel@tonic-gate static pam_handle_t *pamh; /* Authentication handle */ 3590Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 3600Sstevel@tonic-gate 3610Sstevel@tonic-gate /* 3620Sstevel@tonic-gate * Function declarations 3630Sstevel@tonic-gate */ 3640Sstevel@tonic-gate static void turn_on_logging(void); 3650Sstevel@tonic-gate static void defaults(void); 3660Sstevel@tonic-gate static void usage(void); 3670Sstevel@tonic-gate static void process_rlogin(void); 3680Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 3690Sstevel@tonic-gate static void login_authenticate(); 3700Sstevel@tonic-gate static void setup_credentials(void); 3710Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 3720Sstevel@tonic-gate static void adjust_nice(void); 3730Sstevel@tonic-gate static void update_utmpx_entry(int); 3740Sstevel@tonic-gate static void establish_user_environment(char **); 3750Sstevel@tonic-gate static void print_banner(void); 3760Sstevel@tonic-gate static void display_last_login_time(void); 3770Sstevel@tonic-gate static void exec_the_shell(void); 3780Sstevel@tonic-gate static int process_chroot_logins(void); 3790Sstevel@tonic-gate static void chdir_to_dir_user(void); 3800Sstevel@tonic-gate static void check_log(void); 3810Sstevel@tonic-gate static void validate_account(void); 3820Sstevel@tonic-gate static void doremoteterm(char *); 3830Sstevel@tonic-gate static int get_options(int, char **); 3840Sstevel@tonic-gate static void getstr(char *, int, char *); 3850Sstevel@tonic-gate static int legalenvvar(char *); 3860Sstevel@tonic-gate static void check_for_console(void); 3870Sstevel@tonic-gate static void check_for_dueling_unix(char *); 3880Sstevel@tonic-gate static void get_user_name(void); 3890Sstevel@tonic-gate static uint_t get_audit_id(void); 390523Sbasabi static void login_exit(int)__NORETURN; 3910Sstevel@tonic-gate static int logins_disabled(char *); 3920Sstevel@tonic-gate static void log_bad_attempts(void); 3930Sstevel@tonic-gate static int is_number(char *); 3940Sstevel@tonic-gate 3950Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 3960Sstevel@tonic-gate /* 3970Sstevel@tonic-gate * *** main *** 3980Sstevel@tonic-gate * 3990Sstevel@tonic-gate * The primary flow of control is directed in this routine. 4000Sstevel@tonic-gate * Control moves in line from top to bottom calling subfunctions 4010Sstevel@tonic-gate * which perform the bulk of the work. Many of these calls exit 4020Sstevel@tonic-gate * when a fatal error is encountered and do not return to main. 4030Sstevel@tonic-gate * 4040Sstevel@tonic-gate * 4050Sstevel@tonic-gate */ 4060Sstevel@tonic-gate 407523Sbasabi int 4080Sstevel@tonic-gate main(int argc, char *argv[], char **renvp) 4090Sstevel@tonic-gate { 4100Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 4110Sstevel@tonic-gate int sublogin; 4120Sstevel@tonic-gate int pam_rc; 4130Sstevel@tonic-gate 4146646Srz201010 login_pid = getpid(); 4156646Srz201010 4160Sstevel@tonic-gate /* 4170Sstevel@tonic-gate * Set up Defaults and flags 4180Sstevel@tonic-gate */ 4190Sstevel@tonic-gate defaults(); 4200Sstevel@tonic-gate SCPYL(progname, PROG_NAME); 4210Sstevel@tonic-gate 4220Sstevel@tonic-gate /* 4230Sstevel@tonic-gate * Set up default umask 4240Sstevel@tonic-gate */ 4250Sstevel@tonic-gate if (Umask > ((mode_t)0777)) 4260Sstevel@tonic-gate Umask = DEFUMASK; 4270Sstevel@tonic-gate (void) umask(Umask); 4280Sstevel@tonic-gate 4290Sstevel@tonic-gate /* 4300Sstevel@tonic-gate * Set up default timeouts and delays 4310Sstevel@tonic-gate */ 4320Sstevel@tonic-gate if (Def_timeout > MAX_TIMEOUT) 4330Sstevel@tonic-gate Def_timeout = MAX_TIMEOUT; 4340Sstevel@tonic-gate if (Sleeptime < 0 || Sleeptime > 5) 4350Sstevel@tonic-gate Sleeptime = SLEEPTIME; 4360Sstevel@tonic-gate 4370Sstevel@tonic-gate (void) alarm(Def_timeout); 4380Sstevel@tonic-gate 4390Sstevel@tonic-gate /* 4400Sstevel@tonic-gate * Ignore SIGQUIT and SIGINT and set nice to 0 4410Sstevel@tonic-gate */ 4420Sstevel@tonic-gate (void) signal(SIGQUIT, SIG_IGN); 4430Sstevel@tonic-gate (void) signal(SIGINT, SIG_IGN); 4440Sstevel@tonic-gate (void) nice(0); 4450Sstevel@tonic-gate 4460Sstevel@tonic-gate /* 4470Sstevel@tonic-gate * Set flag to disable the pid check if you find that you are 4480Sstevel@tonic-gate * a subsystem login. 4490Sstevel@tonic-gate */ 4500Sstevel@tonic-gate sublogin = 0; 4510Sstevel@tonic-gate if (*renvp && strcmp(*renvp, SUBLOGIN) == 0) 4520Sstevel@tonic-gate sublogin = 1; 4530Sstevel@tonic-gate 4540Sstevel@tonic-gate /* 4550Sstevel@tonic-gate * Parse Arguments 4560Sstevel@tonic-gate */ 4570Sstevel@tonic-gate if (get_options(argc, argv) == -1) { 4580Sstevel@tonic-gate usage(); 4590Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_BAD_CMD; 4600Sstevel@tonic-gate login_exit(1); 4610Sstevel@tonic-gate } 4620Sstevel@tonic-gate 4630Sstevel@tonic-gate /* 4640Sstevel@tonic-gate * if devicename is not passed as argument, call ttyname(0) 4650Sstevel@tonic-gate */ 4660Sstevel@tonic-gate if (ttyn == NULL) { 4670Sstevel@tonic-gate ttyn = ttyname(0); 4680Sstevel@tonic-gate if (ttyn == NULL) 4690Sstevel@tonic-gate ttyn = "/dev/???"; 4700Sstevel@tonic-gate } 4710Sstevel@tonic-gate 4720Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 4730Sstevel@tonic-gate /* 4740Sstevel@tonic-gate * Call pam_start to initiate a PAM authentication operation 4750Sstevel@tonic-gate */ 4760Sstevel@tonic-gate 4770Sstevel@tonic-gate if ((pam_rc = pam_start(progname, user_name, &pam_conv, &pamh)) 4780Sstevel@tonic-gate != PAM_SUCCESS) { 4790Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + pam_rc; 4800Sstevel@tonic-gate login_exit(1); 4810Sstevel@tonic-gate } 4820Sstevel@tonic-gate if ((pam_rc = pam_set_item(pamh, PAM_TTY, ttyn)) != PAM_SUCCESS) { 4830Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + pam_rc; 4840Sstevel@tonic-gate login_exit(1); 4850Sstevel@tonic-gate } 4860Sstevel@tonic-gate if ((pam_rc = pam_set_item(pamh, PAM_RHOST, remote_host)) != 4870Sstevel@tonic-gate PAM_SUCCESS) { 4880Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + pam_rc; 4890Sstevel@tonic-gate login_exit(1); 4900Sstevel@tonic-gate } 4910Sstevel@tonic-gate 4920Sstevel@tonic-gate /* 4930Sstevel@tonic-gate * We currently only support special handling of the KRB5 PAM repository 4940Sstevel@tonic-gate */ 4950Sstevel@tonic-gate if ((Rflag && strlen(repository)) && 4960Sstevel@tonic-gate strcmp(repository, KRB5_REPOSITORY_NAME) == 0 && 4970Sstevel@tonic-gate (uflag && strlen(identity))) { 4980Sstevel@tonic-gate krb5_repository_data_t krb5_data; 4990Sstevel@tonic-gate pam_repository_t pam_rep_data; 5000Sstevel@tonic-gate 5010Sstevel@tonic-gate krb5_data.principal = identity; 5020Sstevel@tonic-gate krb5_data.flags = SUNW_PAM_KRB5_ALREADY_AUTHENTICATED; 5030Sstevel@tonic-gate 5040Sstevel@tonic-gate pam_rep_data.type = repository; 5050Sstevel@tonic-gate pam_rep_data.scope = (void *)&krb5_data; 5060Sstevel@tonic-gate pam_rep_data.scope_len = sizeof (krb5_data); 5070Sstevel@tonic-gate 5080Sstevel@tonic-gate (void) pam_set_item(pamh, PAM_REPOSITORY, 5090Sstevel@tonic-gate (void *)&pam_rep_data); 5100Sstevel@tonic-gate } 5110Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 5120Sstevel@tonic-gate 5130Sstevel@tonic-gate /* 5140Sstevel@tonic-gate * Open the log file which contains a record of successful and failed 5150Sstevel@tonic-gate * login attempts 5160Sstevel@tonic-gate */ 5170Sstevel@tonic-gate turn_on_logging(); 5180Sstevel@tonic-gate 5190Sstevel@tonic-gate /* 5200Sstevel@tonic-gate * say "hi" to syslogd .. 5210Sstevel@tonic-gate */ 5220Sstevel@tonic-gate openlog("login", 0, LOG_AUTH); 5230Sstevel@tonic-gate 5240Sstevel@tonic-gate /* 5250Sstevel@tonic-gate * Do special processing for -r (rlogin) flag 5260Sstevel@tonic-gate */ 5270Sstevel@tonic-gate if (rflag) 5280Sstevel@tonic-gate process_rlogin(); 5290Sstevel@tonic-gate 5300Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 5310Sstevel@tonic-gate /* 5320Sstevel@tonic-gate * validate user 5330Sstevel@tonic-gate */ 5340Sstevel@tonic-gate /* we are already authenticated. fill in what we must, then continue */ 5350Sstevel@tonic-gate if (fflag) { 5360Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 5370Sstevel@tonic-gate if ((pwd = getpwnam(user_name)) == NULL) { 5380Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_USERNAME; 5390Sstevel@tonic-gate 5400Sstevel@tonic-gate log_bad_attempts(); 5410Sstevel@tonic-gate (void) printf("Login failed: unknown user '%s'.\n", 5420Sstevel@tonic-gate user_name); 5430Sstevel@tonic-gate login_exit(1); 5440Sstevel@tonic-gate } 5450Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 5460Sstevel@tonic-gate } else { 5470Sstevel@tonic-gate /* 5480Sstevel@tonic-gate * Perform the primary login authentication activity. 5490Sstevel@tonic-gate */ 5500Sstevel@tonic-gate login_authenticate(); 5510Sstevel@tonic-gate } 5520Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 5530Sstevel@tonic-gate 5540Sstevel@tonic-gate /* change root login, then we exec another login and try again */ 5550Sstevel@tonic-gate if (process_chroot_logins() != OK) 5560Sstevel@tonic-gate login_exit(1); 5570Sstevel@tonic-gate 5580Sstevel@tonic-gate /* 5590Sstevel@tonic-gate * If root login and not on system console then call exit(2) 5600Sstevel@tonic-gate */ 5610Sstevel@tonic-gate check_for_console(); 5620Sstevel@tonic-gate 5630Sstevel@tonic-gate /* 5640Sstevel@tonic-gate * Check to see if a shutdown is in progress, if it is and 5650Sstevel@tonic-gate * we are not root then throw the user off the system 5660Sstevel@tonic-gate */ 5670Sstevel@tonic-gate if (logins_disabled(user_name) == TRUE) { 5680Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_LOGIN_DISABLED; 5690Sstevel@tonic-gate login_exit(1); 5700Sstevel@tonic-gate } 5710Sstevel@tonic-gate 5720Sstevel@tonic-gate if (pwd->pw_uid == 0) { 5730Sstevel@tonic-gate if (Def_supath != NULL) 5740Sstevel@tonic-gate Def_path = Def_supath; 5750Sstevel@tonic-gate else 5760Sstevel@tonic-gate Def_path = DEF_SUPATH; 5770Sstevel@tonic-gate } 5780Sstevel@tonic-gate 5790Sstevel@tonic-gate /* 5800Sstevel@tonic-gate * Check account expiration and passwd aging 5810Sstevel@tonic-gate */ 5820Sstevel@tonic-gate validate_account(); 5830Sstevel@tonic-gate 5840Sstevel@tonic-gate /* 5850Sstevel@tonic-gate * We only get here if we've been authenticated. 5860Sstevel@tonic-gate */ 5870Sstevel@tonic-gate 5880Sstevel@tonic-gate /* 5890Sstevel@tonic-gate * Now we set up the environment for the new user, which includes 5900Sstevel@tonic-gate * the users ulimit, nice value, ownership of this tty, uid, gid, 5910Sstevel@tonic-gate * and environment variables. 5920Sstevel@tonic-gate */ 5930Sstevel@tonic-gate if (Def_ulimit > 0L && ulimit(SET_FSIZ, Def_ulimit) < 0L) 5940Sstevel@tonic-gate (void) printf("Could not set ULIMIT to %ld\n", Def_ulimit); 5950Sstevel@tonic-gate 5960Sstevel@tonic-gate /* di_devperm_login() sends detailed errors to syslog */ 5970Sstevel@tonic-gate if (di_devperm_login((const char *)ttyn, pwd->pw_uid, pwd->pw_gid, 5980Sstevel@tonic-gate NULL) == -1) { 5990Sstevel@tonic-gate (void) fprintf(stderr, "error processing /etc/logindevperm," 6000Sstevel@tonic-gate " see syslog for more details\n"); 6010Sstevel@tonic-gate } 6020Sstevel@tonic-gate 6030Sstevel@tonic-gate adjust_nice(); /* passwd file can specify nice value */ 6040Sstevel@tonic-gate 6050Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 6066646Srz201010 setup_credentials(); /* Set user credentials - exits on failure */ 6076646Srz201010 6086646Srz201010 /* 6096646Srz201010 * NOTE: telnetd and rlogind rely upon this updating of utmpx 6106646Srz201010 * to indicate that the authentication completed successfully, 6116646Srz201010 * pam_open_session was called and therefore they are required to 6126646Srz201010 * call pam_close_session. 6136646Srz201010 */ 6146646Srz201010 update_utmpx_entry(sublogin); 6156646Srz201010 6166646Srz201010 /* set the real (and effective) UID */ 6176646Srz201010 if (setuid(pwd->pw_uid) == -1) { 6186646Srz201010 login_exit(1); 6196646Srz201010 } 6200Sstevel@tonic-gate 6210Sstevel@tonic-gate /* 6220Sstevel@tonic-gate * Set up the basic environment for the exec. This includes 6230Sstevel@tonic-gate * HOME, PATH, LOGNAME, SHELL, TERM, TZ, HZ, and MAIL. 6240Sstevel@tonic-gate */ 6250Sstevel@tonic-gate chdir_to_dir_user(); 6260Sstevel@tonic-gate 6270Sstevel@tonic-gate establish_user_environment(renvp); 6280Sstevel@tonic-gate 6290Sstevel@tonic-gate (void) pam_end(pamh, PAM_SUCCESS); /* Done using PAM */ 6300Sstevel@tonic-gate pamh = NULL; 6310Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 6320Sstevel@tonic-gate 6330Sstevel@tonic-gate if (pwd->pw_uid == 0) { 6340Sstevel@tonic-gate if (dosyslog) { 6350Sstevel@tonic-gate if (remote_host[0]) { 6367324Sgww syslog(LOG_NOTICE, "ROOT LOGIN %s FROM %.*s", 6377324Sgww ttyn, HMAX, remote_host); 6380Sstevel@tonic-gate } else 6390Sstevel@tonic-gate syslog(LOG_NOTICE, "ROOT LOGIN %s", ttyn); 6400Sstevel@tonic-gate } 6410Sstevel@tonic-gate } 6420Sstevel@tonic-gate closelog(); 6430Sstevel@tonic-gate 6440Sstevel@tonic-gate (void) signal(SIGQUIT, SIG_DFL); 6450Sstevel@tonic-gate (void) signal(SIGINT, SIG_DFL); 6460Sstevel@tonic-gate 6470Sstevel@tonic-gate /* 6480Sstevel@tonic-gate * Display some useful information to the new user like the banner 6490Sstevel@tonic-gate * and last login time if not a quiet login. 6500Sstevel@tonic-gate */ 6510Sstevel@tonic-gate 6520Sstevel@tonic-gate if (access(HUSHLOGIN, F_OK) != 0) { 6530Sstevel@tonic-gate print_banner(); 6540Sstevel@tonic-gate display_last_login_time(); 6550Sstevel@tonic-gate } 6560Sstevel@tonic-gate 6570Sstevel@tonic-gate /* 6580Sstevel@tonic-gate * Set SIGXCPU and SIGXFSZ to default disposition. 6590Sstevel@tonic-gate * Shells inherit signal disposition from parent. 6600Sstevel@tonic-gate * And the shells should have default dispositions 6610Sstevel@tonic-gate * for the two below signals. 6620Sstevel@tonic-gate */ 6630Sstevel@tonic-gate (void) signal(SIGXCPU, SIG_DFL); 6640Sstevel@tonic-gate (void) signal(SIGXFSZ, SIG_DFL); 6650Sstevel@tonic-gate 6660Sstevel@tonic-gate /* 6670Sstevel@tonic-gate * Now fire off the shell of choice 6680Sstevel@tonic-gate */ 6690Sstevel@tonic-gate exec_the_shell(); 6700Sstevel@tonic-gate 6710Sstevel@tonic-gate /* 6720Sstevel@tonic-gate * All done 6730Sstevel@tonic-gate */ 6740Sstevel@tonic-gate login_exit(1); 675523Sbasabi return (0); 6760Sstevel@tonic-gate } 6770Sstevel@tonic-gate 6780Sstevel@tonic-gate 6790Sstevel@tonic-gate /* 6800Sstevel@tonic-gate * *** Utility functions *** 6810Sstevel@tonic-gate */ 6820Sstevel@tonic-gate 6830Sstevel@tonic-gate 6840Sstevel@tonic-gate 6850Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 6860Sstevel@tonic-gate /* 6870Sstevel@tonic-gate * donothing & catch - Signal catching functions 6880Sstevel@tonic-gate */ 6890Sstevel@tonic-gate 6900Sstevel@tonic-gate /*ARGSUSED*/ 6910Sstevel@tonic-gate static void 6920Sstevel@tonic-gate donothing(int sig) 6930Sstevel@tonic-gate { 6940Sstevel@tonic-gate if (pamh) 6950Sstevel@tonic-gate (void) pam_end(pamh, PAM_ABORT); 6960Sstevel@tonic-gate } 6970Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 6980Sstevel@tonic-gate 6990Sstevel@tonic-gate #ifdef notdef 7000Sstevel@tonic-gate static int intrupt; 7010Sstevel@tonic-gate 7020Sstevel@tonic-gate /*ARGSUSED*/ 7030Sstevel@tonic-gate static void 7040Sstevel@tonic-gate catch(int sig) 7050Sstevel@tonic-gate { 7060Sstevel@tonic-gate ++intrupt; 7070Sstevel@tonic-gate } 7080Sstevel@tonic-gate #endif 7090Sstevel@tonic-gate 7100Sstevel@tonic-gate /* 7110Sstevel@tonic-gate * *** Bad login logging support *** 7120Sstevel@tonic-gate */ 7130Sstevel@tonic-gate 7140Sstevel@tonic-gate /* 7150Sstevel@tonic-gate * badlogin() - log to the log file 'trys' 7160Sstevel@tonic-gate * unsuccessful attempts 7170Sstevel@tonic-gate */ 7180Sstevel@tonic-gate 7190Sstevel@tonic-gate static void 7200Sstevel@tonic-gate badlogin(void) 7210Sstevel@tonic-gate { 7220Sstevel@tonic-gate int retval, count1, fildes; 7230Sstevel@tonic-gate 7240Sstevel@tonic-gate /* 7250Sstevel@tonic-gate * Tries to open the log file. If succeed, lock it and write 7260Sstevel@tonic-gate * in the failed attempts 7270Sstevel@tonic-gate */ 7280Sstevel@tonic-gate if ((fildes = open(LOGINLOG, O_APPEND|O_WRONLY)) != -1) { 7290Sstevel@tonic-gate 7300Sstevel@tonic-gate (void) sigset(SIGALRM, donothing); 7310Sstevel@tonic-gate (void) alarm(L_WAITTIME); 7320Sstevel@tonic-gate retval = lockf(fildes, F_LOCK, 0L); 7330Sstevel@tonic-gate (void) alarm(0); 7340Sstevel@tonic-gate (void) sigset(SIGALRM, SIG_DFL); 7350Sstevel@tonic-gate if (retval == 0) { 7360Sstevel@tonic-gate for (count1 = 0; count1 < trys; count1++) 7370Sstevel@tonic-gate (void) write(fildes, log_entry[count1], 7380Sstevel@tonic-gate (unsigned)strlen(log_entry[count1])); 7390Sstevel@tonic-gate (void) lockf(fildes, F_ULOCK, 0L); 7400Sstevel@tonic-gate } 7410Sstevel@tonic-gate (void) close(fildes); 7420Sstevel@tonic-gate } 7430Sstevel@tonic-gate } 7440Sstevel@tonic-gate 7450Sstevel@tonic-gate 7460Sstevel@tonic-gate /* 7470Sstevel@tonic-gate * log_bad_attempts - log each bad login attempt - called from 7480Sstevel@tonic-gate * login_authenticate. Exits when the maximum attempt 7490Sstevel@tonic-gate * count is exceeded. 7500Sstevel@tonic-gate */ 7510Sstevel@tonic-gate 7520Sstevel@tonic-gate static void 7530Sstevel@tonic-gate log_bad_attempts(void) 7540Sstevel@tonic-gate { 7550Sstevel@tonic-gate time_t timenow; 7560Sstevel@tonic-gate 7570Sstevel@tonic-gate if (trys >= LOGTRYS) 7580Sstevel@tonic-gate return; 7590Sstevel@tonic-gate if (writelog) { 7600Sstevel@tonic-gate (void) time(&timenow); 7610Sstevel@tonic-gate (void) strncat(log_entry[trys], user_name, LNAME_SIZE); 7620Sstevel@tonic-gate (void) strncat(log_entry[trys], ":", (size_t)1); 7630Sstevel@tonic-gate (void) strncat(log_entry[trys], ttyn, TTYN_SIZE); 7640Sstevel@tonic-gate (void) strncat(log_entry[trys], ":", (size_t)1); 7657324Sgww (void) strncat(log_entry[trys], ctime(&timenow), TIME_SIZE); 7660Sstevel@tonic-gate trys++; 7670Sstevel@tonic-gate } 7680Sstevel@tonic-gate if (count > flogin) { 7690Sstevel@tonic-gate if ((pwd = getpwnam(user_name)) != NULL) { 7700Sstevel@tonic-gate if (remote_host[0]) { 7710Sstevel@tonic-gate syslog(LOG_NOTICE, 7720Sstevel@tonic-gate "Login failure on %s from %.*s, " 7730Sstevel@tonic-gate "%.*s", ttyn, HMAX, remote_host, 7740Sstevel@tonic-gate NMAX, user_name); 7750Sstevel@tonic-gate } else { 7760Sstevel@tonic-gate syslog(LOG_NOTICE, 7770Sstevel@tonic-gate "Login failure on %s, %.*s", 7780Sstevel@tonic-gate ttyn, NMAX, user_name); 7790Sstevel@tonic-gate } 7800Sstevel@tonic-gate } else { 7810Sstevel@tonic-gate if (remote_host[0]) { 7820Sstevel@tonic-gate syslog(LOG_NOTICE, 7830Sstevel@tonic-gate "Login failure on %s from %.*s", 7840Sstevel@tonic-gate ttyn, HMAX, remote_host); 7850Sstevel@tonic-gate } else { 7860Sstevel@tonic-gate syslog(LOG_NOTICE, 7870Sstevel@tonic-gate "Login failure on %s", ttyn); 7880Sstevel@tonic-gate } 7890Sstevel@tonic-gate } 7900Sstevel@tonic-gate } 7910Sstevel@tonic-gate } 7920Sstevel@tonic-gate 7930Sstevel@tonic-gate 7940Sstevel@tonic-gate /* 7950Sstevel@tonic-gate * turn_on_logging - if the logfile exist, turn on attempt logging and 7960Sstevel@tonic-gate * initialize the string storage area 7970Sstevel@tonic-gate */ 7980Sstevel@tonic-gate 7990Sstevel@tonic-gate static void 8000Sstevel@tonic-gate turn_on_logging(void) 8010Sstevel@tonic-gate { 8020Sstevel@tonic-gate struct stat dbuf; 8030Sstevel@tonic-gate int i; 8040Sstevel@tonic-gate 8050Sstevel@tonic-gate if (stat(LOGINLOG, &dbuf) == 0) { 8060Sstevel@tonic-gate writelog = 1; 8070Sstevel@tonic-gate for (i = 0; i < LOGTRYS; i++) { 8080Sstevel@tonic-gate if (!(log_entry[i] = malloc((size_t)ENT_SIZE))) { 8090Sstevel@tonic-gate writelog = 0; 8100Sstevel@tonic-gate break; 8110Sstevel@tonic-gate } 8120Sstevel@tonic-gate *log_entry[i] = '\0'; 8130Sstevel@tonic-gate } 8140Sstevel@tonic-gate } 8150Sstevel@tonic-gate } 8160Sstevel@tonic-gate 8170Sstevel@tonic-gate 8180Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 8190Sstevel@tonic-gate /* 8200Sstevel@tonic-gate * login_conv(): 8210Sstevel@tonic-gate * This is the conv (conversation) function called from 8220Sstevel@tonic-gate * a PAM authentication module to print error messages 8230Sstevel@tonic-gate * or garner information from the user. 8240Sstevel@tonic-gate */ 8250Sstevel@tonic-gate /*ARGSUSED*/ 8260Sstevel@tonic-gate static int 8270Sstevel@tonic-gate login_conv(int num_msg, struct pam_message **msg, 8280Sstevel@tonic-gate struct pam_response **response, void *appdata_ptr) 8290Sstevel@tonic-gate { 8300Sstevel@tonic-gate struct pam_message *m; 8310Sstevel@tonic-gate struct pam_response *r; 8320Sstevel@tonic-gate char *temp; 8330Sstevel@tonic-gate int k, i; 8340Sstevel@tonic-gate 8350Sstevel@tonic-gate if (num_msg <= 0) 8360Sstevel@tonic-gate return (PAM_CONV_ERR); 8370Sstevel@tonic-gate 8380Sstevel@tonic-gate *response = calloc(num_msg, sizeof (struct pam_response)); 8390Sstevel@tonic-gate if (*response == NULL) 8400Sstevel@tonic-gate return (PAM_BUF_ERR); 8410Sstevel@tonic-gate 8420Sstevel@tonic-gate k = num_msg; 8430Sstevel@tonic-gate m = *msg; 8440Sstevel@tonic-gate r = *response; 8450Sstevel@tonic-gate while (k--) { 8460Sstevel@tonic-gate 8470Sstevel@tonic-gate switch (m->msg_style) { 8480Sstevel@tonic-gate 8490Sstevel@tonic-gate case PAM_PROMPT_ECHO_OFF: 8502515Sas145665 errno = 0; 8510Sstevel@tonic-gate temp = getpassphrase(m->msg); 8520Sstevel@tonic-gate if (temp != NULL) { 8532515Sas145665 if (errno == EINTR) 8542515Sas145665 return (PAM_CONV_ERR); 8552515Sas145665 8560Sstevel@tonic-gate r->resp = strdup(temp); 8570Sstevel@tonic-gate if (r->resp == NULL) { 8580Sstevel@tonic-gate /* free responses */ 8590Sstevel@tonic-gate r = *response; 8600Sstevel@tonic-gate for (i = 0; i < num_msg; i++, r++) { 8610Sstevel@tonic-gate if (r->resp) 8620Sstevel@tonic-gate free(r->resp); 8630Sstevel@tonic-gate } 8640Sstevel@tonic-gate free(*response); 8650Sstevel@tonic-gate *response = NULL; 8660Sstevel@tonic-gate return (PAM_BUF_ERR); 8670Sstevel@tonic-gate } 8680Sstevel@tonic-gate } 8690Sstevel@tonic-gate 8700Sstevel@tonic-gate m++; 8710Sstevel@tonic-gate r++; 8720Sstevel@tonic-gate break; 8730Sstevel@tonic-gate 8740Sstevel@tonic-gate case PAM_PROMPT_ECHO_ON: 8750Sstevel@tonic-gate if (m->msg != NULL) 8760Sstevel@tonic-gate (void) fputs(m->msg, stdout); 8770Sstevel@tonic-gate r->resp = calloc(1, PAM_MAX_RESP_SIZE); 8780Sstevel@tonic-gate if (r->resp == NULL) { 8790Sstevel@tonic-gate /* free responses */ 8800Sstevel@tonic-gate r = *response; 8810Sstevel@tonic-gate for (i = 0; i < num_msg; i++, r++) { 8820Sstevel@tonic-gate if (r->resp) 8830Sstevel@tonic-gate free(r->resp); 8840Sstevel@tonic-gate } 8850Sstevel@tonic-gate free(*response); 8860Sstevel@tonic-gate *response = NULL; 8870Sstevel@tonic-gate return (PAM_BUF_ERR); 8880Sstevel@tonic-gate } 8890Sstevel@tonic-gate /* 8900Sstevel@tonic-gate * The response might include environment variables 8910Sstevel@tonic-gate * information. We should store that information in 8920Sstevel@tonic-gate * envp if there is any; otherwise, envp is set to 8930Sstevel@tonic-gate * NULL. 8940Sstevel@tonic-gate */ 8950Sstevel@tonic-gate bzero((void *)inputline, MAXLINE); 8960Sstevel@tonic-gate 8970Sstevel@tonic-gate envp = getargs(inputline); 8980Sstevel@tonic-gate 8990Sstevel@tonic-gate /* If we read in any input, process it. */ 9000Sstevel@tonic-gate if (inputline[0] != '\0') { 9010Sstevel@tonic-gate int len; 9020Sstevel@tonic-gate 9030Sstevel@tonic-gate if (envp != (char **)NULL) 9040Sstevel@tonic-gate /* 9050Sstevel@tonic-gate * If getargs() did not return NULL, 9060Sstevel@tonic-gate * *envp is the first string in 9070Sstevel@tonic-gate * inputline. envp++ makes envp point 9080Sstevel@tonic-gate * to environment variables information 9090Sstevel@tonic-gate * or be NULL. 9100Sstevel@tonic-gate */ 9110Sstevel@tonic-gate envp++; 9120Sstevel@tonic-gate 9130Sstevel@tonic-gate (void) strncpy(r->resp, inputline, 9147324Sgww PAM_MAX_RESP_SIZE-1); 9150Sstevel@tonic-gate r->resp[PAM_MAX_RESP_SIZE-1] = NULL; 9160Sstevel@tonic-gate len = strlen(r->resp); 9170Sstevel@tonic-gate if (r->resp[len-1] == '\n') 9180Sstevel@tonic-gate r->resp[len-1] = '\0'; 9190Sstevel@tonic-gate } else { 9200Sstevel@tonic-gate login_exit(1); 9210Sstevel@tonic-gate } 9220Sstevel@tonic-gate m++; 9230Sstevel@tonic-gate r++; 9240Sstevel@tonic-gate break; 9250Sstevel@tonic-gate 9260Sstevel@tonic-gate case PAM_ERROR_MSG: 9270Sstevel@tonic-gate if (m->msg != NULL) { 9280Sstevel@tonic-gate (void) fputs(m->msg, stderr); 9290Sstevel@tonic-gate (void) fputs("\n", stderr); 9300Sstevel@tonic-gate } 9310Sstevel@tonic-gate m++; 9320Sstevel@tonic-gate r++; 9330Sstevel@tonic-gate break; 9340Sstevel@tonic-gate case PAM_TEXT_INFO: 9350Sstevel@tonic-gate if (m->msg != NULL) { 9360Sstevel@tonic-gate (void) fputs(m->msg, stdout); 9370Sstevel@tonic-gate (void) fputs("\n", stdout); 9380Sstevel@tonic-gate } 9390Sstevel@tonic-gate m++; 9400Sstevel@tonic-gate r++; 9410Sstevel@tonic-gate break; 9420Sstevel@tonic-gate 9430Sstevel@tonic-gate default: 9440Sstevel@tonic-gate break; 9450Sstevel@tonic-gate } 9460Sstevel@tonic-gate } 9470Sstevel@tonic-gate return (PAM_SUCCESS); 9480Sstevel@tonic-gate } 9490Sstevel@tonic-gate 9500Sstevel@tonic-gate /* 9510Sstevel@tonic-gate * verify_passwd - Authenticates the user. 9520Sstevel@tonic-gate * Returns: PAM_SUCCESS if authentication successful, 9530Sstevel@tonic-gate * PAM error code if authentication fails. 9540Sstevel@tonic-gate */ 9550Sstevel@tonic-gate 9560Sstevel@tonic-gate static int 957523Sbasabi verify_passwd(void) 9580Sstevel@tonic-gate { 9590Sstevel@tonic-gate int error; 9600Sstevel@tonic-gate char *user; 9610Sstevel@tonic-gate int flag = 0; 9620Sstevel@tonic-gate 9630Sstevel@tonic-gate /* 9640Sstevel@tonic-gate * PAM authenticates the user for us. 9650Sstevel@tonic-gate */ 9667324Sgww error = pam_authenticate(pamh, flag); 9670Sstevel@tonic-gate 9680Sstevel@tonic-gate /* get the user_name from the pam handle */ 9690Sstevel@tonic-gate (void) pam_get_item(pamh, PAM_USER, (void**)&user); 9700Sstevel@tonic-gate 9710Sstevel@tonic-gate if (user == NULL || *user == '\0') 9720Sstevel@tonic-gate return (PAM_SYSTEM_ERR); 9730Sstevel@tonic-gate 9740Sstevel@tonic-gate SCPYL(user_name, user); 9750Sstevel@tonic-gate check_for_dueling_unix(user_name); 9760Sstevel@tonic-gate 9777324Sgww if (((pwd = getpwnam(user_name)) == NULL) && 9787324Sgww (error != PAM_USER_UNKNOWN)) { 9790Sstevel@tonic-gate return (PAM_SYSTEM_ERR); 9800Sstevel@tonic-gate } 9810Sstevel@tonic-gate 9820Sstevel@tonic-gate return (error); 9830Sstevel@tonic-gate } 9840Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 9850Sstevel@tonic-gate 9860Sstevel@tonic-gate /* 9870Sstevel@tonic-gate * quotec - Called by getargs 9880Sstevel@tonic-gate */ 9890Sstevel@tonic-gate 9900Sstevel@tonic-gate static int 9910Sstevel@tonic-gate quotec(void) 9920Sstevel@tonic-gate { 9930Sstevel@tonic-gate int c, i, num; 9940Sstevel@tonic-gate 9950Sstevel@tonic-gate switch (c = getc(stdin)) { 9960Sstevel@tonic-gate 9970Sstevel@tonic-gate case 'n': 9980Sstevel@tonic-gate c = '\n'; 9990Sstevel@tonic-gate break; 10000Sstevel@tonic-gate 10010Sstevel@tonic-gate case 'r': 10020Sstevel@tonic-gate c = '\r'; 10030Sstevel@tonic-gate break; 10040Sstevel@tonic-gate 10050Sstevel@tonic-gate case 'v': 10060Sstevel@tonic-gate c = '\013'; 10070Sstevel@tonic-gate break; 10080Sstevel@tonic-gate 10090Sstevel@tonic-gate case 'b': 10100Sstevel@tonic-gate c = '\b'; 10110Sstevel@tonic-gate break; 10120Sstevel@tonic-gate 10130Sstevel@tonic-gate case 't': 10140Sstevel@tonic-gate c = '\t'; 10150Sstevel@tonic-gate break; 10160Sstevel@tonic-gate 10170Sstevel@tonic-gate case 'f': 10180Sstevel@tonic-gate c = '\f'; 10190Sstevel@tonic-gate break; 10200Sstevel@tonic-gate 10210Sstevel@tonic-gate case '0': 10220Sstevel@tonic-gate case '1': 10230Sstevel@tonic-gate case '2': 10240Sstevel@tonic-gate case '3': 10250Sstevel@tonic-gate case '4': 10260Sstevel@tonic-gate case '5': 10270Sstevel@tonic-gate case '6': 10280Sstevel@tonic-gate case '7': 10290Sstevel@tonic-gate for (num = 0, i = 0; i < 3; i++) { 10300Sstevel@tonic-gate num = num * 8 + (c - '0'); 10310Sstevel@tonic-gate if ((c = getc(stdin)) < '0' || c > '7') 10320Sstevel@tonic-gate break; 10330Sstevel@tonic-gate } 10340Sstevel@tonic-gate (void) ungetc(c, stdin); 10350Sstevel@tonic-gate c = num & 0377; 10360Sstevel@tonic-gate break; 10370Sstevel@tonic-gate 10380Sstevel@tonic-gate default: 10390Sstevel@tonic-gate break; 10400Sstevel@tonic-gate } 10410Sstevel@tonic-gate return (c); 10420Sstevel@tonic-gate } 10430Sstevel@tonic-gate 10440Sstevel@tonic-gate /* 10450Sstevel@tonic-gate * getargs - returns an input line. Exits if EOF encountered. 10460Sstevel@tonic-gate */ 10470Sstevel@tonic-gate #define WHITESPACE 0 10480Sstevel@tonic-gate #define ARGUMENT 1 10490Sstevel@tonic-gate 10500Sstevel@tonic-gate static char ** 10510Sstevel@tonic-gate getargs(char *input_line) 10520Sstevel@tonic-gate { 10530Sstevel@tonic-gate static char envbuf[MAXLINE]; 10540Sstevel@tonic-gate static char *args[MAXARGS]; 10550Sstevel@tonic-gate char *ptr, **answer; 10560Sstevel@tonic-gate int c; 10570Sstevel@tonic-gate int state; 10580Sstevel@tonic-gate char *p = input_line; 10590Sstevel@tonic-gate 10600Sstevel@tonic-gate ptr = envbuf; 10610Sstevel@tonic-gate answer = &args[0]; 10620Sstevel@tonic-gate state = WHITESPACE; 10630Sstevel@tonic-gate 10640Sstevel@tonic-gate while ((c = getc(stdin)) != EOF && answer < &args[MAXARGS-1]) { 10650Sstevel@tonic-gate 10660Sstevel@tonic-gate *(input_line++) = c; 10670Sstevel@tonic-gate 10680Sstevel@tonic-gate switch (c) { 10690Sstevel@tonic-gate 10700Sstevel@tonic-gate case '\n': 10710Sstevel@tonic-gate if (ptr == &envbuf[0]) 10720Sstevel@tonic-gate return ((char **)NULL); 10730Sstevel@tonic-gate *input_line = *ptr = '\0'; 10740Sstevel@tonic-gate *answer = NULL; 10750Sstevel@tonic-gate return (&args[0]); 10760Sstevel@tonic-gate 10770Sstevel@tonic-gate case ' ': 10780Sstevel@tonic-gate case '\t': 10790Sstevel@tonic-gate if (state == ARGUMENT) { 10800Sstevel@tonic-gate *ptr++ = '\0'; 10810Sstevel@tonic-gate state = WHITESPACE; 10820Sstevel@tonic-gate } 10830Sstevel@tonic-gate break; 10840Sstevel@tonic-gate 10850Sstevel@tonic-gate case '\\': 10860Sstevel@tonic-gate c = quotec(); 10870Sstevel@tonic-gate 10880Sstevel@tonic-gate default: 10890Sstevel@tonic-gate if (state == WHITESPACE) { 10900Sstevel@tonic-gate *answer++ = ptr; 10910Sstevel@tonic-gate state = ARGUMENT; 10920Sstevel@tonic-gate } 10930Sstevel@tonic-gate *ptr++ = c; 10940Sstevel@tonic-gate } 10950Sstevel@tonic-gate 10960Sstevel@tonic-gate /* Attempt at overflow, exit */ 10970Sstevel@tonic-gate if (input_line - p >= MAXLINE - 1 || 10980Sstevel@tonic-gate ptr >= &envbuf[sizeof (envbuf) - 1]) { 10990Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_INPUT_OVERFLOW; 11000Sstevel@tonic-gate login_exit(1); 11010Sstevel@tonic-gate } 11020Sstevel@tonic-gate } 11030Sstevel@tonic-gate 11040Sstevel@tonic-gate /* 11050Sstevel@tonic-gate * If we left loop because an EOF was received or we've overflown 11060Sstevel@tonic-gate * args[], exit immediately. 11070Sstevel@tonic-gate */ 11080Sstevel@tonic-gate login_exit(0); 11090Sstevel@tonic-gate /* NOTREACHED */ 11100Sstevel@tonic-gate } 11110Sstevel@tonic-gate 11120Sstevel@tonic-gate /* 11130Sstevel@tonic-gate * get_user_name - Gets the user name either passed in, or from the 11140Sstevel@tonic-gate * login: prompt. 11150Sstevel@tonic-gate */ 11160Sstevel@tonic-gate 11170Sstevel@tonic-gate static void 1118523Sbasabi get_user_name(void) 11190Sstevel@tonic-gate { 11200Sstevel@tonic-gate FILE *fp; 11210Sstevel@tonic-gate 11220Sstevel@tonic-gate if ((fp = fopen(ISSUEFILE, "r")) != NULL) { 11230Sstevel@tonic-gate char *ptr, buffer[BUFSIZ]; 11247324Sgww while ((ptr = fgets(buffer, sizeof (buffer), fp)) != NULL) { 11250Sstevel@tonic-gate (void) fputs(ptr, stdout); 11260Sstevel@tonic-gate } 11270Sstevel@tonic-gate (void) fclose(fp); 11280Sstevel@tonic-gate } 11290Sstevel@tonic-gate 11300Sstevel@tonic-gate /* 11310Sstevel@tonic-gate * if TTYPROMPT is not set, use our own prompt 11320Sstevel@tonic-gate * otherwise, use ttyprompt. We just set PAM_USER_PROMPT 11330Sstevel@tonic-gate * and let the module do the prompting. 11340Sstevel@tonic-gate */ 11350Sstevel@tonic-gate 11360Sstevel@tonic-gate if ((ttyprompt == NULL) || (*ttyprompt == '\0')) 11370Sstevel@tonic-gate (void) pam_set_item(pamh, PAM_USER_PROMPT, (void *)loginmsg); 11380Sstevel@tonic-gate else 11390Sstevel@tonic-gate (void) pam_set_item(pamh, PAM_USER_PROMPT, (void *)ttyprompt); 11400Sstevel@tonic-gate 11410Sstevel@tonic-gate envp = &zero; /* XXX: is this right? */ 11420Sstevel@tonic-gate } 11430Sstevel@tonic-gate 11440Sstevel@tonic-gate 11450Sstevel@tonic-gate /* 11460Sstevel@tonic-gate * Check_for_dueling_unix - Check to see if the another login is talking 11470Sstevel@tonic-gate * to the line we've got open as a login port 11480Sstevel@tonic-gate * Exits if we're talking to another unix system 11490Sstevel@tonic-gate */ 11500Sstevel@tonic-gate 11510Sstevel@tonic-gate static void 11520Sstevel@tonic-gate check_for_dueling_unix(char *inputline) 11530Sstevel@tonic-gate { 11540Sstevel@tonic-gate if (EQN(loginmsg, inputline) || EQN(passwdmsg, inputline) || 11550Sstevel@tonic-gate EQN(incorrectmsg, inputline)) { 11560Sstevel@tonic-gate (void) printf("Looking at a login line.\n"); 11570Sstevel@tonic-gate login_exit(8); 11580Sstevel@tonic-gate } 11590Sstevel@tonic-gate } 11600Sstevel@tonic-gate 11610Sstevel@tonic-gate /* 11620Sstevel@tonic-gate * logins_disabled - if the file /etc/nologin exists and the user is not 11630Sstevel@tonic-gate * root then do not permit them to login 11640Sstevel@tonic-gate */ 11650Sstevel@tonic-gate static int 11660Sstevel@tonic-gate logins_disabled(char *user_name) 11670Sstevel@tonic-gate { 11680Sstevel@tonic-gate FILE *nlfd; 11690Sstevel@tonic-gate int c; 11700Sstevel@tonic-gate if (!EQN("root", user_name) && 11717324Sgww ((nlfd = fopen(NOLOGIN, "r")) != (FILE *)NULL)) { 11720Sstevel@tonic-gate while ((c = getc(nlfd)) != EOF) 11730Sstevel@tonic-gate (void) putchar(c); 11740Sstevel@tonic-gate (void) fflush(stdout); 11750Sstevel@tonic-gate (void) sleep(5); 11760Sstevel@tonic-gate return (TRUE); 11770Sstevel@tonic-gate } 11780Sstevel@tonic-gate return (FALSE); 11790Sstevel@tonic-gate } 11800Sstevel@tonic-gate 1181*7688SAaron.Zang@Sun.COM #define DEFAULT_CONSOLE "/dev/console" 1182*7688SAaron.Zang@Sun.COM 11830Sstevel@tonic-gate /* 11840Sstevel@tonic-gate * check_for_console - Checks if we're getting a root login on the 1185*7688SAaron.Zang@Sun.COM * console, or a login from the global zone. Exits if not. 11860Sstevel@tonic-gate * 1187*7688SAaron.Zang@Sun.COM * If CONSOLE is set to /dev/console in /etc/default/login, then root logins 1188*7688SAaron.Zang@Sun.COM * on /dev/vt/# are permitted as well. /dev/vt/# does not exist in non-global 1189*7688SAaron.Zang@Sun.COM * zones, but checking them does no harm. 11900Sstevel@tonic-gate */ 11910Sstevel@tonic-gate static void 11920Sstevel@tonic-gate check_for_console(void) 11930Sstevel@tonic-gate { 1194*7688SAaron.Zang@Sun.COM const char *consoles[] = { "/dev/console", "/dev/vt/", NULL }; 1195*7688SAaron.Zang@Sun.COM int i; 1196*7688SAaron.Zang@Sun.COM 1197*7688SAaron.Zang@Sun.COM if (pwd == NULL || pwd->pw_uid != 0 || zflag != B_FALSE || 1198*7688SAaron.Zang@Sun.COM Console == NULL) 1199*7688SAaron.Zang@Sun.COM return; 12000Sstevel@tonic-gate 1201*7688SAaron.Zang@Sun.COM if (strcmp(Console, DEFAULT_CONSOLE) == 0) { 1202*7688SAaron.Zang@Sun.COM for (i = 0; consoles[i] != NULL; i ++) { 1203*7688SAaron.Zang@Sun.COM if (strncmp(ttyn, consoles[i], 1204*7688SAaron.Zang@Sun.COM strlen(consoles[i])) == 0) 1205*7688SAaron.Zang@Sun.COM return; 12060Sstevel@tonic-gate } 1207*7688SAaron.Zang@Sun.COM } else { 1208*7688SAaron.Zang@Sun.COM if (strcmp(ttyn, Console) == 0) 1209*7688SAaron.Zang@Sun.COM return; 12100Sstevel@tonic-gate } 1211*7688SAaron.Zang@Sun.COM 1212*7688SAaron.Zang@Sun.COM (void) printf("Not on system console\n"); 1213*7688SAaron.Zang@Sun.COM 1214*7688SAaron.Zang@Sun.COM audit_error = ADT_FAIL_VALUE_CONSOLE; 1215*7688SAaron.Zang@Sun.COM login_exit(10); 1216*7688SAaron.Zang@Sun.COM 12170Sstevel@tonic-gate } 12180Sstevel@tonic-gate 12190Sstevel@tonic-gate /* 12200Sstevel@tonic-gate * List of environment variables or environment variable prefixes that should 12210Sstevel@tonic-gate * not be propagated across logins, such as when the login -p option is used. 12220Sstevel@tonic-gate */ 12230Sstevel@tonic-gate static const char *const illegal[] = { 12240Sstevel@tonic-gate "SHELL=", 12250Sstevel@tonic-gate "HOME=", 12260Sstevel@tonic-gate "LOGNAME=", 12270Sstevel@tonic-gate #ifndef NO_MAIL 12280Sstevel@tonic-gate "MAIL=", 12290Sstevel@tonic-gate #endif 12300Sstevel@tonic-gate "CDPATH=", 12310Sstevel@tonic-gate "IFS=", 12320Sstevel@tonic-gate "PATH=", 12330Sstevel@tonic-gate "LD_", 12340Sstevel@tonic-gate "SMF_", 12350Sstevel@tonic-gate NULL 12360Sstevel@tonic-gate }; 12370Sstevel@tonic-gate 12380Sstevel@tonic-gate /* 12390Sstevel@tonic-gate * legalenvvar - Is it legal to insert this environmental variable? 12400Sstevel@tonic-gate */ 12410Sstevel@tonic-gate 12420Sstevel@tonic-gate static int 12430Sstevel@tonic-gate legalenvvar(char *s) 12440Sstevel@tonic-gate { 12450Sstevel@tonic-gate const char *const *p; 12460Sstevel@tonic-gate 12470Sstevel@tonic-gate for (p = &illegal[0]; *p; p++) { 12480Sstevel@tonic-gate if (strncmp(s, *p, strlen(*p)) == 0) 12490Sstevel@tonic-gate return (0); 12500Sstevel@tonic-gate } 12510Sstevel@tonic-gate 12520Sstevel@tonic-gate return (1); 12530Sstevel@tonic-gate } 12540Sstevel@tonic-gate 12550Sstevel@tonic-gate 12560Sstevel@tonic-gate /* 12570Sstevel@tonic-gate * getstr - Get a string from standard input 12580Sstevel@tonic-gate * Calls exit if read(2) fails. 12590Sstevel@tonic-gate */ 12600Sstevel@tonic-gate 12610Sstevel@tonic-gate static void 12620Sstevel@tonic-gate getstr(char *buf, int cnt, char *err) 12630Sstevel@tonic-gate { 12640Sstevel@tonic-gate char c; 12650Sstevel@tonic-gate 12660Sstevel@tonic-gate do { 12670Sstevel@tonic-gate if (read(0, &c, 1) != 1) 12680Sstevel@tonic-gate login_exit(1); 12690Sstevel@tonic-gate *buf++ = c; 12700Sstevel@tonic-gate } while (--cnt > 1 && c != 0); 12710Sstevel@tonic-gate 12720Sstevel@tonic-gate *buf = 0; 12730Sstevel@tonic-gate err = err; /* For lint */ 12740Sstevel@tonic-gate } 12750Sstevel@tonic-gate 12760Sstevel@tonic-gate 12770Sstevel@tonic-gate /* 12780Sstevel@tonic-gate * defaults - read defaults 12790Sstevel@tonic-gate */ 12800Sstevel@tonic-gate 12810Sstevel@tonic-gate static void 12820Sstevel@tonic-gate defaults(void) 12830Sstevel@tonic-gate { 12840Sstevel@tonic-gate int flags; 12850Sstevel@tonic-gate char *ptr; 12860Sstevel@tonic-gate 12870Sstevel@tonic-gate if (defopen(Pndefault) == 0) { 12880Sstevel@tonic-gate /* 12890Sstevel@tonic-gate * ignore case 12900Sstevel@tonic-gate */ 12910Sstevel@tonic-gate flags = defcntl(DC_GETFLAGS, 0); 12920Sstevel@tonic-gate TURNOFF(flags, DC_CASE); 12930Sstevel@tonic-gate (void) defcntl(DC_SETFLAGS, flags); 12940Sstevel@tonic-gate 12950Sstevel@tonic-gate if ((Console = defread("CONSOLE=")) != NULL) 12960Sstevel@tonic-gate Console = strdup(Console); 12970Sstevel@tonic-gate 12980Sstevel@tonic-gate if ((Altshell = defread("ALTSHELL=")) != NULL) 12990Sstevel@tonic-gate Altshell = strdup(Altshell); 13000Sstevel@tonic-gate 13010Sstevel@tonic-gate if ((ptr = defread("PASSREQ=")) != NULL && 13020Sstevel@tonic-gate strcasecmp("YES", ptr) == 0) 13030Sstevel@tonic-gate Passreqflag = 1; 13040Sstevel@tonic-gate 13050Sstevel@tonic-gate if ((Def_tz = defread("TIMEZONE=")) != NULL) 13060Sstevel@tonic-gate Def_tz = strdup(Def_tz); 13070Sstevel@tonic-gate 13080Sstevel@tonic-gate if ((Def_hertz = defread("HZ=")) != NULL) 13090Sstevel@tonic-gate Def_hertz = strdup(Def_hertz); 13100Sstevel@tonic-gate 13110Sstevel@tonic-gate if ((Def_path = defread("PATH=")) != NULL) 13120Sstevel@tonic-gate Def_path = strdup(Def_path); 13130Sstevel@tonic-gate 13140Sstevel@tonic-gate if ((Def_supath = defread("SUPATH=")) != NULL) 13150Sstevel@tonic-gate Def_supath = strdup(Def_supath); 13160Sstevel@tonic-gate 13170Sstevel@tonic-gate if ((ptr = defread("ULIMIT=")) != NULL) 13180Sstevel@tonic-gate Def_ulimit = atol(ptr); 13190Sstevel@tonic-gate 13200Sstevel@tonic-gate if ((ptr = defread("TIMEOUT=")) != NULL) 13210Sstevel@tonic-gate Def_timeout = (unsigned)atoi(ptr); 13220Sstevel@tonic-gate 13230Sstevel@tonic-gate if ((ptr = defread("UMASK=")) != NULL) 13240Sstevel@tonic-gate if (sscanf(ptr, "%lo", &Umask) != 1) 13250Sstevel@tonic-gate Umask = DEFUMASK; 13260Sstevel@tonic-gate 13270Sstevel@tonic-gate if ((ptr = defread("SLEEPTIME=")) != NULL) { 13280Sstevel@tonic-gate if (is_number(ptr)) 13290Sstevel@tonic-gate Sleeptime = atoi(ptr); 13300Sstevel@tonic-gate } 13310Sstevel@tonic-gate 13320Sstevel@tonic-gate if ((ptr = defread("DISABLETIME=")) != NULL) { 13330Sstevel@tonic-gate if (is_number(ptr)) 13340Sstevel@tonic-gate Disabletime = atoi(ptr); 13350Sstevel@tonic-gate } 13360Sstevel@tonic-gate 13370Sstevel@tonic-gate if ((ptr = defread("SYSLOG=")) != NULL) 13380Sstevel@tonic-gate dosyslog = strcmp(ptr, "YES") == 0; 13390Sstevel@tonic-gate 13400Sstevel@tonic-gate if ((ptr = defread("RETRIES=")) != NULL) { 13410Sstevel@tonic-gate if (is_number(ptr)) 13420Sstevel@tonic-gate retry = atoi(ptr); 13430Sstevel@tonic-gate } 13440Sstevel@tonic-gate 13450Sstevel@tonic-gate if ((ptr = defread("SYSLOG_FAILED_LOGINS=")) != NULL) { 13460Sstevel@tonic-gate if (is_number(ptr)) 13470Sstevel@tonic-gate flogin = atoi(ptr); 13480Sstevel@tonic-gate else 13490Sstevel@tonic-gate flogin = retry; 13500Sstevel@tonic-gate } else 13510Sstevel@tonic-gate flogin = retry; 13520Sstevel@tonic-gate (void) defopen((char *)NULL); 13530Sstevel@tonic-gate } 13540Sstevel@tonic-gate } 13550Sstevel@tonic-gate 13560Sstevel@tonic-gate 13570Sstevel@tonic-gate /* 13580Sstevel@tonic-gate * get_options(argc, argv) 13590Sstevel@tonic-gate * - parse the cmd line. 13600Sstevel@tonic-gate * - return 0 if successful, -1 if failed. 13610Sstevel@tonic-gate * Calls login_exit() on misuse of -r, -h, and -z flags 13620Sstevel@tonic-gate */ 13630Sstevel@tonic-gate 13640Sstevel@tonic-gate static int 13650Sstevel@tonic-gate get_options(int argc, char *argv[]) 13660Sstevel@tonic-gate { 13670Sstevel@tonic-gate int c; 13680Sstevel@tonic-gate int errflg = 0; 13690Sstevel@tonic-gate char sflagname[NMAX+1]; 13700Sstevel@tonic-gate const char *flags_message = "Only one of -r, -h and -z allowed\n"; 13710Sstevel@tonic-gate 13720Sstevel@tonic-gate while ((c = getopt(argc, argv, "u:s:R:f:h:r:pad:t:U:z:")) != -1) { 13730Sstevel@tonic-gate switch (c) { 13740Sstevel@tonic-gate case 'a': 13750Sstevel@tonic-gate break; 13760Sstevel@tonic-gate 13770Sstevel@tonic-gate case 'd': 13780Sstevel@tonic-gate /* 13790Sstevel@tonic-gate * Must be root to pass in device name 13800Sstevel@tonic-gate * otherwise we exit() as punishment for trying. 13810Sstevel@tonic-gate */ 13820Sstevel@tonic-gate if (getuid() != 0 || geteuid() != 0) { 13830Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_DEVICE_PERM; 13840Sstevel@tonic-gate login_exit(1); /* sigh */ 13850Sstevel@tonic-gate /*NOTREACHED*/ 13860Sstevel@tonic-gate } 13870Sstevel@tonic-gate ttyn = optarg; 13880Sstevel@tonic-gate break; 13890Sstevel@tonic-gate 13900Sstevel@tonic-gate case 'h': 13910Sstevel@tonic-gate if (hflag || rflag || zflag) { 13920Sstevel@tonic-gate (void) fprintf(stderr, flags_message); 13930Sstevel@tonic-gate login_exit(1); 13940Sstevel@tonic-gate } 13950Sstevel@tonic-gate hflag = B_TRUE; 13960Sstevel@tonic-gate SCPYL(remote_host, optarg); 13970Sstevel@tonic-gate if (argv[optind]) { 13980Sstevel@tonic-gate if (argv[optind][0] != '-') { 13990Sstevel@tonic-gate SCPYL(terminal, argv[optind]); 14000Sstevel@tonic-gate optind++; 14010Sstevel@tonic-gate } else { 14020Sstevel@tonic-gate /* 14030Sstevel@tonic-gate * Allow "login -h hostname -" to 14040Sstevel@tonic-gate * skip setting up an username as "-". 14050Sstevel@tonic-gate */ 14060Sstevel@tonic-gate if (argv[optind][1] == '\0') 14070Sstevel@tonic-gate optind++; 14080Sstevel@tonic-gate } 14090Sstevel@tonic-gate 14100Sstevel@tonic-gate } 14110Sstevel@tonic-gate SCPYL(progname, "telnet"); 14120Sstevel@tonic-gate break; 14130Sstevel@tonic-gate 14140Sstevel@tonic-gate case 'r': 14150Sstevel@tonic-gate if (hflag || rflag || zflag) { 14160Sstevel@tonic-gate (void) fprintf(stderr, flags_message); 14170Sstevel@tonic-gate login_exit(1); 14180Sstevel@tonic-gate } 14190Sstevel@tonic-gate rflag = B_TRUE; 14200Sstevel@tonic-gate SCPYL(remote_host, optarg); 14210Sstevel@tonic-gate SCPYL(progname, "rlogin"); 14220Sstevel@tonic-gate break; 14230Sstevel@tonic-gate 14240Sstevel@tonic-gate case 'p': 14250Sstevel@tonic-gate pflag = B_TRUE; 14260Sstevel@tonic-gate break; 14270Sstevel@tonic-gate 14280Sstevel@tonic-gate case 'f': 14290Sstevel@tonic-gate /* 14300Sstevel@tonic-gate * Must be root to bypass authentication 14310Sstevel@tonic-gate * otherwise we exit() as punishment for trying. 14320Sstevel@tonic-gate */ 14330Sstevel@tonic-gate if (getuid() != 0 || geteuid() != 0) { 14340Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_AUTH_BYPASS; 14350Sstevel@tonic-gate 14360Sstevel@tonic-gate login_exit(1); /* sigh */ 14370Sstevel@tonic-gate /*NOTREACHED*/ 14380Sstevel@tonic-gate } 14390Sstevel@tonic-gate /* save fflag user name for future use */ 14400Sstevel@tonic-gate SCPYL(user_name, optarg); 14410Sstevel@tonic-gate fflag = B_TRUE; 14420Sstevel@tonic-gate break; 14430Sstevel@tonic-gate case 'u': 14440Sstevel@tonic-gate if (!strlen(optarg)) { 14450Sstevel@tonic-gate (void) fprintf(stderr, 14467324Sgww "Empty string supplied with -u\n"); 14470Sstevel@tonic-gate login_exit(1); 14480Sstevel@tonic-gate } 14490Sstevel@tonic-gate SCPYL(identity, optarg); 14500Sstevel@tonic-gate uflag = B_TRUE; 14510Sstevel@tonic-gate break; 14520Sstevel@tonic-gate case 's': 14530Sstevel@tonic-gate if (!strlen(optarg)) { 14540Sstevel@tonic-gate (void) fprintf(stderr, 14557324Sgww "Empty string supplied with -s\n"); 14560Sstevel@tonic-gate login_exit(1); 14570Sstevel@tonic-gate } 14580Sstevel@tonic-gate SCPYL(sflagname, optarg); 14590Sstevel@tonic-gate sflag = B_TRUE; 14600Sstevel@tonic-gate break; 14610Sstevel@tonic-gate case 'R': 14620Sstevel@tonic-gate if (!strlen(optarg)) { 14630Sstevel@tonic-gate (void) fprintf(stderr, 14647324Sgww "Empty string supplied with -R\n"); 14650Sstevel@tonic-gate login_exit(1); 14660Sstevel@tonic-gate } 14670Sstevel@tonic-gate SCPYL(repository, optarg); 14680Sstevel@tonic-gate Rflag = B_TRUE; 14690Sstevel@tonic-gate break; 14700Sstevel@tonic-gate case 't': 14710Sstevel@tonic-gate if (!strlen(optarg)) { 14720Sstevel@tonic-gate (void) fprintf(stderr, 14737324Sgww "Empty string supplied with -t\n"); 14740Sstevel@tonic-gate login_exit(1); 14750Sstevel@tonic-gate } 14760Sstevel@tonic-gate SCPYL(terminal, optarg); 14770Sstevel@tonic-gate tflag = B_TRUE; 14780Sstevel@tonic-gate break; 14790Sstevel@tonic-gate case 'U': 14800Sstevel@tonic-gate /* 14810Sstevel@tonic-gate * Kerberized rlogind may fork us with 14820Sstevel@tonic-gate * -U "" if the rlogin client used the "-a" 14830Sstevel@tonic-gate * option to send a NULL username. This is done 14840Sstevel@tonic-gate * to force login to prompt for a user/password. 14850Sstevel@tonic-gate * However, if Kerberos auth was used, we dont need 14860Sstevel@tonic-gate * to prompt, so we will accept the option and 14870Sstevel@tonic-gate * handle the situation later. 14880Sstevel@tonic-gate */ 14890Sstevel@tonic-gate SCPYL(rusername, optarg); 14900Sstevel@tonic-gate Uflag = B_TRUE; 14910Sstevel@tonic-gate break; 14920Sstevel@tonic-gate case 'z': 14930Sstevel@tonic-gate if (hflag || rflag || zflag) { 14940Sstevel@tonic-gate (void) fprintf(stderr, flags_message); 14950Sstevel@tonic-gate login_exit(1); 14960Sstevel@tonic-gate } 14970Sstevel@tonic-gate (void) snprintf(zone_name, sizeof (zone_name), 14980Sstevel@tonic-gate "zone:%s", optarg); 14990Sstevel@tonic-gate SCPYL(progname, "zlogin"); 15000Sstevel@tonic-gate zflag = B_TRUE; 15010Sstevel@tonic-gate break; 15020Sstevel@tonic-gate default: 15030Sstevel@tonic-gate errflg++; 15040Sstevel@tonic-gate break; 15050Sstevel@tonic-gate } /* end switch */ 15060Sstevel@tonic-gate } /* end while */ 15070Sstevel@tonic-gate 15080Sstevel@tonic-gate /* 15090Sstevel@tonic-gate * If the 's svcname' flag was used, override the progname 15100Sstevel@tonic-gate * value that is to be used in the pam_start call. 15110Sstevel@tonic-gate */ 15120Sstevel@tonic-gate if (sflag) 15130Sstevel@tonic-gate SCPYL(progname, sflagname); 15140Sstevel@tonic-gate 15150Sstevel@tonic-gate /* 15160Sstevel@tonic-gate * get the prompt set by ttymon 15170Sstevel@tonic-gate */ 15180Sstevel@tonic-gate ttyprompt = getenv("TTYPROMPT"); 15190Sstevel@tonic-gate 15200Sstevel@tonic-gate if ((ttyprompt != NULL) && (*ttyprompt != '\0')) { 15210Sstevel@tonic-gate /* 15220Sstevel@tonic-gate * if ttyprompt is set, there should be data on 15230Sstevel@tonic-gate * the stream already. 15240Sstevel@tonic-gate */ 15250Sstevel@tonic-gate if ((envp = getargs(inputline)) != (char **)NULL) { 15260Sstevel@tonic-gate /* 15270Sstevel@tonic-gate * don't get name if name passed as argument. 15280Sstevel@tonic-gate */ 15290Sstevel@tonic-gate SCPYL(user_name, *envp++); 15300Sstevel@tonic-gate } 15310Sstevel@tonic-gate } else if (optind < argc) { 15320Sstevel@tonic-gate SCPYL(user_name, argv[optind]); 15330Sstevel@tonic-gate (void) SCPYL(inputline, user_name); 15340Sstevel@tonic-gate (void) strlcat(inputline, " \n", sizeof (inputline)); 15350Sstevel@tonic-gate envp = &argv[optind+1]; 15360Sstevel@tonic-gate 15370Sstevel@tonic-gate if (!fflag) 15380Sstevel@tonic-gate SCPYL(lusername, user_name); 15390Sstevel@tonic-gate } 15400Sstevel@tonic-gate 15410Sstevel@tonic-gate if (errflg) 15420Sstevel@tonic-gate return (-1); 15430Sstevel@tonic-gate return (0); 15440Sstevel@tonic-gate } 15450Sstevel@tonic-gate 15460Sstevel@tonic-gate /* 15470Sstevel@tonic-gate * usage - Print usage message 15480Sstevel@tonic-gate * 15490Sstevel@tonic-gate */ 15500Sstevel@tonic-gate static void 15510Sstevel@tonic-gate usage(void) 15520Sstevel@tonic-gate { 15530Sstevel@tonic-gate (void) fprintf(stderr, 15540Sstevel@tonic-gate "usage:\n" 15550Sstevel@tonic-gate " login [-p] [-d device] [-R repository] [-s service]\n" 15560Sstevel@tonic-gate "\t[-t terminal] [-u identity] [-U ruser]\n" 15570Sstevel@tonic-gate "\t[-h hostname [terminal] | -r hostname] [name [environ]...]\n"); 15580Sstevel@tonic-gate 15590Sstevel@tonic-gate } 15600Sstevel@tonic-gate 15610Sstevel@tonic-gate /* 15620Sstevel@tonic-gate * doremoteterm - Sets the appropriate ioctls for a remote terminal 15630Sstevel@tonic-gate */ 15640Sstevel@tonic-gate static char *speeds[] = { 15650Sstevel@tonic-gate "0", "50", "75", "110", "134", "150", "200", "300", 15660Sstevel@tonic-gate "600", "1200", "1800", "2400", "4800", "9600", "19200", "38400", 15670Sstevel@tonic-gate "57600", "76800", "115200", "153600", "230400", "307200", "460800" 15680Sstevel@tonic-gate }; 15690Sstevel@tonic-gate 15700Sstevel@tonic-gate #define NSPEEDS (sizeof (speeds) / sizeof (speeds[0])) 15710Sstevel@tonic-gate 15720Sstevel@tonic-gate 15730Sstevel@tonic-gate static void 15740Sstevel@tonic-gate doremoteterm(char *term) 15750Sstevel@tonic-gate { 15760Sstevel@tonic-gate struct termios tp; 15770Sstevel@tonic-gate char *cp = strchr(term, '/'), **cpp; 15780Sstevel@tonic-gate char *speed; 15790Sstevel@tonic-gate 15800Sstevel@tonic-gate (void) ioctl(0, TCGETS, &tp); 15810Sstevel@tonic-gate 15820Sstevel@tonic-gate if (cp) { 15830Sstevel@tonic-gate *cp++ = '\0'; 15840Sstevel@tonic-gate speed = cp; 15850Sstevel@tonic-gate cp = strchr(speed, '/'); 15860Sstevel@tonic-gate 15870Sstevel@tonic-gate if (cp) 15880Sstevel@tonic-gate *cp++ = '\0'; 15890Sstevel@tonic-gate 15900Sstevel@tonic-gate for (cpp = speeds; cpp < &speeds[NSPEEDS]; cpp++) 15910Sstevel@tonic-gate if (strcmp(*cpp, speed) == 0) { 15920Sstevel@tonic-gate (void) cfsetospeed(&tp, cpp-speeds); 15930Sstevel@tonic-gate break; 15940Sstevel@tonic-gate } 15950Sstevel@tonic-gate } 15960Sstevel@tonic-gate 15970Sstevel@tonic-gate tp.c_lflag |= ECHO|ICANON; 15980Sstevel@tonic-gate tp.c_iflag |= IGNPAR|ICRNL; 15990Sstevel@tonic-gate 16000Sstevel@tonic-gate (void) ioctl(0, TCSETS, &tp); 16010Sstevel@tonic-gate 16020Sstevel@tonic-gate } 16030Sstevel@tonic-gate 16040Sstevel@tonic-gate /* 16050Sstevel@tonic-gate * Process_rlogin - Does the work that rlogin and telnet 16060Sstevel@tonic-gate * need done 16070Sstevel@tonic-gate */ 16080Sstevel@tonic-gate static void 16090Sstevel@tonic-gate process_rlogin(void) 16100Sstevel@tonic-gate { 16110Sstevel@tonic-gate /* 16120Sstevel@tonic-gate * If a Kerberized rlogin was initiated, then these fields 16130Sstevel@tonic-gate * must be read by rlogin daemon itself and passed down via 16140Sstevel@tonic-gate * cmd line args. 16150Sstevel@tonic-gate */ 16160Sstevel@tonic-gate if (!Uflag && !strlen(rusername)) 16170Sstevel@tonic-gate getstr(rusername, sizeof (rusername), "remuser"); 16180Sstevel@tonic-gate if (!strlen(lusername)) 16190Sstevel@tonic-gate getstr(lusername, sizeof (lusername), "locuser"); 16200Sstevel@tonic-gate if (!tflag && !strlen(terminal)) 16210Sstevel@tonic-gate getstr(terminal, sizeof (terminal), "Terminal type"); 16220Sstevel@tonic-gate 16230Sstevel@tonic-gate if (strlen(terminal)) 16240Sstevel@tonic-gate doremoteterm(terminal); 16250Sstevel@tonic-gate 16260Sstevel@tonic-gate /* fflag has precedence over stuff passed by rlogind */ 16270Sstevel@tonic-gate if (fflag || getuid()) { 16280Sstevel@tonic-gate pwd = &nouser; 16290Sstevel@tonic-gate return; 16300Sstevel@tonic-gate } else { 16310Sstevel@tonic-gate if (pam_set_item(pamh, PAM_USER, lusername) != PAM_SUCCESS) 16320Sstevel@tonic-gate login_exit(1); 16330Sstevel@tonic-gate 16340Sstevel@tonic-gate pwd = getpwnam(lusername); 16350Sstevel@tonic-gate if (pwd == NULL) { 16360Sstevel@tonic-gate pwd = &nouser; 16370Sstevel@tonic-gate return; 16380Sstevel@tonic-gate } 16390Sstevel@tonic-gate } 16400Sstevel@tonic-gate 16410Sstevel@tonic-gate /* 16420Sstevel@tonic-gate * Update PAM on the user name 16430Sstevel@tonic-gate */ 16440Sstevel@tonic-gate if (strlen(lusername) && 16450Sstevel@tonic-gate pam_set_item(pamh, PAM_USER, lusername) != PAM_SUCCESS) 16460Sstevel@tonic-gate login_exit(1); 16470Sstevel@tonic-gate 16480Sstevel@tonic-gate if (strlen(rusername) && 16490Sstevel@tonic-gate pam_set_item(pamh, PAM_RUSER, rusername) != PAM_SUCCESS) 16500Sstevel@tonic-gate login_exit(1); 16510Sstevel@tonic-gate 16520Sstevel@tonic-gate SCPYL(user_name, lusername); 16530Sstevel@tonic-gate envp = &zero; 16540Sstevel@tonic-gate lusername[0] = '\0'; 16550Sstevel@tonic-gate } 16560Sstevel@tonic-gate 16570Sstevel@tonic-gate /* 16580Sstevel@tonic-gate * *** Account validation routines *** 16590Sstevel@tonic-gate * 16600Sstevel@tonic-gate */ 16610Sstevel@tonic-gate 16620Sstevel@tonic-gate /* 16630Sstevel@tonic-gate * validate_account - This is the PAM version of validate. 16640Sstevel@tonic-gate */ 16650Sstevel@tonic-gate 16660Sstevel@tonic-gate static void 16670Sstevel@tonic-gate validate_account(void) 16680Sstevel@tonic-gate { 16690Sstevel@tonic-gate int error; 16700Sstevel@tonic-gate int flag; 16710Sstevel@tonic-gate int tries; /* new password retries */ 16720Sstevel@tonic-gate 16730Sstevel@tonic-gate (void) alarm(0); /* give user time to come up with password */ 16740Sstevel@tonic-gate 16750Sstevel@tonic-gate check_log(); 16760Sstevel@tonic-gate 16770Sstevel@tonic-gate if (Passreqflag) 16780Sstevel@tonic-gate flag = PAM_DISALLOW_NULL_AUTHTOK; 16790Sstevel@tonic-gate else 16800Sstevel@tonic-gate flag = 0; 16810Sstevel@tonic-gate 16820Sstevel@tonic-gate if ((error = pam_acct_mgmt(pamh, flag)) != PAM_SUCCESS) { 16830Sstevel@tonic-gate if (error == PAM_NEW_AUTHTOK_REQD) { 16840Sstevel@tonic-gate tries = 1; 16850Sstevel@tonic-gate error = PAM_AUTHTOK_ERR; 16860Sstevel@tonic-gate while (error == PAM_AUTHTOK_ERR && 16877324Sgww tries <= DEF_ATTEMPTS) { 16880Sstevel@tonic-gate if (tries > 1) 16890Sstevel@tonic-gate (void) printf("Try again\n\n"); 16900Sstevel@tonic-gate 16910Sstevel@tonic-gate (void) printf("Choose a new password.\n"); 16920Sstevel@tonic-gate 16931419Sdarrenm error = pam_chauthtok(pamh, 16941419Sdarrenm PAM_CHANGE_EXPIRED_AUTHTOK); 16950Sstevel@tonic-gate if (error == PAM_TRY_AGAIN) { 16960Sstevel@tonic-gate (void) sleep(1); 16971419Sdarrenm error = pam_chauthtok(pamh, 16981419Sdarrenm PAM_CHANGE_EXPIRED_AUTHTOK); 16990Sstevel@tonic-gate } 17000Sstevel@tonic-gate tries++; 17010Sstevel@tonic-gate } 17020Sstevel@tonic-gate 17030Sstevel@tonic-gate if (error != PAM_SUCCESS) { 17040Sstevel@tonic-gate if (dosyslog) 17050Sstevel@tonic-gate syslog(LOG_CRIT, 17067324Sgww "change password failure: %s", 17077324Sgww pam_strerror(pamh, error)); 17080Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + error; 17090Sstevel@tonic-gate login_exit(1); 17100Sstevel@tonic-gate } else { 17110Sstevel@tonic-gate audit_success(ADT_passwd, pwd, zone_name); 17120Sstevel@tonic-gate } 17130Sstevel@tonic-gate } else { 17140Sstevel@tonic-gate (void) printf(incorrectmsg); 17150Sstevel@tonic-gate 17160Sstevel@tonic-gate if (dosyslog) 17170Sstevel@tonic-gate syslog(LOG_CRIT, 17187324Sgww "login account failure: %s", 17197324Sgww pam_strerror(pamh, error)); 17200Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + error; 17210Sstevel@tonic-gate login_exit(1); 17220Sstevel@tonic-gate } 17230Sstevel@tonic-gate } 17240Sstevel@tonic-gate } 17250Sstevel@tonic-gate 17260Sstevel@tonic-gate /* 17270Sstevel@tonic-gate * Check_log - This is really a hack because PAM checks the log, but login 17280Sstevel@tonic-gate * wants to know if the log is okay and PAM doesn't have 17290Sstevel@tonic-gate * a module independent way of handing this info back. 17300Sstevel@tonic-gate */ 17310Sstevel@tonic-gate 17320Sstevel@tonic-gate static void 17330Sstevel@tonic-gate check_log(void) 17340Sstevel@tonic-gate { 17350Sstevel@tonic-gate int fdl; 17360Sstevel@tonic-gate long long offset; 17370Sstevel@tonic-gate 17380Sstevel@tonic-gate offset = (long long) pwd->pw_uid * (long long) sizeof (struct lastlog); 17390Sstevel@tonic-gate 17400Sstevel@tonic-gate if ((fdl = open(LASTLOG, O_RDWR|O_CREAT, 0444)) >= 0) { 17410Sstevel@tonic-gate if (llseek(fdl, offset, SEEK_SET) == offset && 17420Sstevel@tonic-gate read(fdl, (char *)&ll, sizeof (ll)) == sizeof (ll) && 17430Sstevel@tonic-gate ll.ll_time != 0) 17440Sstevel@tonic-gate lastlogok = 1; 17450Sstevel@tonic-gate (void) close(fdl); 17460Sstevel@tonic-gate } 17470Sstevel@tonic-gate } 17480Sstevel@tonic-gate 17490Sstevel@tonic-gate /* 17500Sstevel@tonic-gate * chdir_to_dir_user - Now chdir after setuid/setgid have happened to 17510Sstevel@tonic-gate * place us in the user's home directory just in 17520Sstevel@tonic-gate * case it was protected and the first chdir failed. 17530Sstevel@tonic-gate * No chdir errors should happen at this point because 17540Sstevel@tonic-gate * all failures should have happened on the first 17550Sstevel@tonic-gate * time around. 17560Sstevel@tonic-gate */ 17570Sstevel@tonic-gate 17580Sstevel@tonic-gate static void 17590Sstevel@tonic-gate chdir_to_dir_user(void) 17600Sstevel@tonic-gate { 17610Sstevel@tonic-gate if (chdir(pwd->pw_dir) < 0) { 17620Sstevel@tonic-gate if (chdir("/") < 0) { 17630Sstevel@tonic-gate (void) printf("No directory!\n"); 17640Sstevel@tonic-gate /* 17650Sstevel@tonic-gate * This probably won't work since we can't get to /. 17660Sstevel@tonic-gate */ 17670Sstevel@tonic-gate if (dosyslog) { 17680Sstevel@tonic-gate if (remote_host[0]) { 17690Sstevel@tonic-gate syslog(LOG_CRIT, 17700Sstevel@tonic-gate "LOGIN FAILURES ON %s FROM %.*s ", 17710Sstevel@tonic-gate " %.*s", ttyn, HMAX, 17720Sstevel@tonic-gate remote_host, NMAX, pwd->pw_name); 17730Sstevel@tonic-gate } else { 17740Sstevel@tonic-gate syslog(LOG_CRIT, 17750Sstevel@tonic-gate "LOGIN FAILURES ON %s, %.*s", 17760Sstevel@tonic-gate ttyn, NMAX, pwd->pw_name); 17770Sstevel@tonic-gate } 17780Sstevel@tonic-gate } 17790Sstevel@tonic-gate closelog(); 17800Sstevel@tonic-gate (void) sleep(Disabletime); 17810Sstevel@tonic-gate exit(1); 17820Sstevel@tonic-gate } else { 17830Sstevel@tonic-gate (void) printf("No directory! Logging in with home=/\n"); 17840Sstevel@tonic-gate pwd->pw_dir = "/"; 17850Sstevel@tonic-gate } 17860Sstevel@tonic-gate } 17870Sstevel@tonic-gate } 17880Sstevel@tonic-gate 17890Sstevel@tonic-gate 17900Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 17910Sstevel@tonic-gate /* 17920Sstevel@tonic-gate * login_authenticate - Performs the main authentication work 17930Sstevel@tonic-gate * 1. Prints the login prompt 17940Sstevel@tonic-gate * 2. Requests and verifys the password 17950Sstevel@tonic-gate * 3. Checks the port password 17960Sstevel@tonic-gate */ 17970Sstevel@tonic-gate 17980Sstevel@tonic-gate static void 1799523Sbasabi login_authenticate(void) 18000Sstevel@tonic-gate { 18010Sstevel@tonic-gate char *user; 18020Sstevel@tonic-gate int err; 18030Sstevel@tonic-gate int login_successful = 0; 18040Sstevel@tonic-gate 18050Sstevel@tonic-gate do { 18060Sstevel@tonic-gate /* if scheme broken, then nothing to do but quit */ 18077324Sgww if (pam_get_item(pamh, PAM_USER, (void **)&user) != PAM_SUCCESS) 18080Sstevel@tonic-gate exit(1); 18090Sstevel@tonic-gate 18100Sstevel@tonic-gate /* 18110Sstevel@tonic-gate * only get name from utility if it is not already 18120Sstevel@tonic-gate * supplied by pam_start or a pam_set_item. 18130Sstevel@tonic-gate */ 18140Sstevel@tonic-gate if (!user || !user[0]) { 18150Sstevel@tonic-gate /* use call back to get user name */ 18160Sstevel@tonic-gate get_user_name(); 18170Sstevel@tonic-gate } 18180Sstevel@tonic-gate 18190Sstevel@tonic-gate err = verify_passwd(); 18200Sstevel@tonic-gate 18210Sstevel@tonic-gate /* 18220Sstevel@tonic-gate * If root login and not on system console then call exit(2) 18230Sstevel@tonic-gate */ 18240Sstevel@tonic-gate check_for_console(); 18250Sstevel@tonic-gate 18260Sstevel@tonic-gate switch (err) { 18270Sstevel@tonic-gate case PAM_SUCCESS: 18280Sstevel@tonic-gate case PAM_NEW_AUTHTOK_REQD: 18290Sstevel@tonic-gate /* 18300Sstevel@tonic-gate * Officially, pam_authenticate() shouldn't return this 18310Sstevel@tonic-gate * but it's probably the right thing to return if 18320Sstevel@tonic-gate * PAM_DISALLOW_NULL_AUTHTOK is set so the user will 18330Sstevel@tonic-gate * be forced to change password later in this code. 18340Sstevel@tonic-gate */ 18350Sstevel@tonic-gate count = 0; 18360Sstevel@tonic-gate login_successful = 1; 18370Sstevel@tonic-gate break; 18380Sstevel@tonic-gate case PAM_MAXTRIES: 18390Sstevel@tonic-gate count = retry; 18400Sstevel@tonic-gate /*FALLTHROUGH*/ 18410Sstevel@tonic-gate case PAM_AUTH_ERR: 18420Sstevel@tonic-gate case PAM_AUTHINFO_UNAVAIL: 18430Sstevel@tonic-gate case PAM_USER_UNKNOWN: 18440Sstevel@tonic-gate audit_failure(get_audit_id(), ADT_FAIL_PAM + err, pwd, 18450Sstevel@tonic-gate remote_host, ttyn, zone_name); 18460Sstevel@tonic-gate log_bad_attempts(); 18470Sstevel@tonic-gate break; 18480Sstevel@tonic-gate case PAM_ABORT: 18490Sstevel@tonic-gate log_bad_attempts(); 18500Sstevel@tonic-gate (void) sleep(Disabletime); 18510Sstevel@tonic-gate (void) printf(incorrectmsg); 18520Sstevel@tonic-gate 18530Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + err; 18540Sstevel@tonic-gate login_exit(1); 18550Sstevel@tonic-gate /*NOTREACHED*/ 18560Sstevel@tonic-gate default: /* Some other PAM error */ 18570Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + err; 18580Sstevel@tonic-gate login_exit(1); 18590Sstevel@tonic-gate /*NOTREACHED*/ 18600Sstevel@tonic-gate } 18610Sstevel@tonic-gate 18620Sstevel@tonic-gate if (login_successful) 18630Sstevel@tonic-gate break; 18640Sstevel@tonic-gate 18650Sstevel@tonic-gate /* sleep after bad passwd */ 18660Sstevel@tonic-gate if (count) 18670Sstevel@tonic-gate (void) sleep(Sleeptime); 18680Sstevel@tonic-gate (void) printf(incorrectmsg); 18690Sstevel@tonic-gate /* force name to be null in this case */ 18700Sstevel@tonic-gate if (pam_set_item(pamh, PAM_USER, NULL) != PAM_SUCCESS) 18710Sstevel@tonic-gate login_exit(1); 18720Sstevel@tonic-gate if (pam_set_item(pamh, PAM_RUSER, NULL) != PAM_SUCCESS) 18730Sstevel@tonic-gate login_exit(1); 18740Sstevel@tonic-gate } while (count++ < retry); 18750Sstevel@tonic-gate 18760Sstevel@tonic-gate if (count >= retry) { 18770Sstevel@tonic-gate audit_failure(get_audit_id(), ADT_FAIL_VALUE_MAX_TRIES, pwd, 18780Sstevel@tonic-gate remote_host, ttyn, zone_name); 18790Sstevel@tonic-gate /* 18800Sstevel@tonic-gate * If logging is turned on, output the 18810Sstevel@tonic-gate * string storage area to the log file, 18820Sstevel@tonic-gate * and sleep for Disabletime 18830Sstevel@tonic-gate * seconds before exiting. 18840Sstevel@tonic-gate */ 18850Sstevel@tonic-gate if (writelog) 18860Sstevel@tonic-gate badlogin(); 18870Sstevel@tonic-gate if (dosyslog) { 18880Sstevel@tonic-gate if ((pwd = getpwnam(user_name)) != NULL) { 18890Sstevel@tonic-gate if (remote_host[0]) { 18900Sstevel@tonic-gate syslog(LOG_CRIT, 18917324Sgww "REPEATED LOGIN FAILURES ON %s " 18927324Sgww "FROM %.*s, %.*s", 18937324Sgww ttyn, HMAX, remote_host, NMAX, 18947324Sgww user_name); 18950Sstevel@tonic-gate } else { 18960Sstevel@tonic-gate syslog(LOG_CRIT, 18977324Sgww "REPEATED LOGIN FAILURES ON " 18987324Sgww "%s, %.*s", 18997324Sgww ttyn, NMAX, user_name); 19000Sstevel@tonic-gate } 19010Sstevel@tonic-gate } else { 19020Sstevel@tonic-gate if (remote_host[0]) { 19030Sstevel@tonic-gate syslog(LOG_CRIT, 19047324Sgww "REPEATED LOGIN FAILURES ON %s " 19057324Sgww "FROM %.*s", 19067324Sgww ttyn, HMAX, remote_host); 19070Sstevel@tonic-gate } else { 19080Sstevel@tonic-gate syslog(LOG_CRIT, 19097324Sgww "REPEATED LOGIN FAILURES ON %s", 19107324Sgww ttyn); 19110Sstevel@tonic-gate } 19120Sstevel@tonic-gate } 19130Sstevel@tonic-gate } 19140Sstevel@tonic-gate (void) sleep(Disabletime); 19150Sstevel@tonic-gate exit(1); 19160Sstevel@tonic-gate } 19170Sstevel@tonic-gate 19180Sstevel@tonic-gate } 19190Sstevel@tonic-gate 19200Sstevel@tonic-gate /* 19210Sstevel@tonic-gate * *** Credential Related routines *** 19220Sstevel@tonic-gate * 19230Sstevel@tonic-gate */ 19240Sstevel@tonic-gate 19250Sstevel@tonic-gate /* 19260Sstevel@tonic-gate * setup_credentials - sets the group ID, initializes the groups 19270Sstevel@tonic-gate * and sets up the secretkey. 19280Sstevel@tonic-gate * Exits if a failure occurrs. 19290Sstevel@tonic-gate */ 19300Sstevel@tonic-gate 19310Sstevel@tonic-gate 19320Sstevel@tonic-gate /* 19330Sstevel@tonic-gate * setup_credentials - PAM does all the work for us on this one. 19340Sstevel@tonic-gate */ 19350Sstevel@tonic-gate 19360Sstevel@tonic-gate static void 19370Sstevel@tonic-gate setup_credentials(void) 19380Sstevel@tonic-gate { 19390Sstevel@tonic-gate int error = 0; 19400Sstevel@tonic-gate 19410Sstevel@tonic-gate /* set the real (and effective) GID */ 19420Sstevel@tonic-gate if (setgid(pwd->pw_gid) == -1) { 19430Sstevel@tonic-gate login_exit(1); 19440Sstevel@tonic-gate } 19450Sstevel@tonic-gate 19460Sstevel@tonic-gate /* 19470Sstevel@tonic-gate * Initialize the supplementary group access list. 19480Sstevel@tonic-gate */ 19490Sstevel@tonic-gate if ((user_name[0] == '\0') || 19500Sstevel@tonic-gate (initgroups(user_name, pwd->pw_gid) == -1)) { 19510Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_PROGRAM; 19520Sstevel@tonic-gate login_exit(1); 19530Sstevel@tonic-gate } 19540Sstevel@tonic-gate 19550Sstevel@tonic-gate if ((error = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) { 19560Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + error; 19570Sstevel@tonic-gate login_exit(error); 19580Sstevel@tonic-gate } 19590Sstevel@tonic-gate 19600Sstevel@tonic-gate /* 19610Sstevel@tonic-gate * Record successful login and fork process that records logout. 19620Sstevel@tonic-gate * We have to do this after setting credentials because pam_setcred() 19630Sstevel@tonic-gate * loads key audit info into the cred, but before setuid() so audit 19640Sstevel@tonic-gate * system calls will work. 19650Sstevel@tonic-gate */ 19660Sstevel@tonic-gate audit_success(get_audit_id(), pwd, zone_name); 19670Sstevel@tonic-gate } 19680Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 19690Sstevel@tonic-gate 19700Sstevel@tonic-gate static uint_t 1971523Sbasabi get_audit_id(void) 1972523Sbasabi { 19730Sstevel@tonic-gate if (rflag) 19740Sstevel@tonic-gate return (ADT_rlogin); 19750Sstevel@tonic-gate else if (hflag) 19760Sstevel@tonic-gate return (ADT_telnet); 19770Sstevel@tonic-gate else if (zflag) 19780Sstevel@tonic-gate return (ADT_zlogin); 19790Sstevel@tonic-gate 19800Sstevel@tonic-gate return (ADT_login); 19810Sstevel@tonic-gate } 19820Sstevel@tonic-gate 19830Sstevel@tonic-gate /* 19840Sstevel@tonic-gate * 19850Sstevel@tonic-gate * *** Routines to get a new user set up and running *** 19860Sstevel@tonic-gate * 19870Sstevel@tonic-gate * Things to do when starting up a new user: 19880Sstevel@tonic-gate * adjust_nice 19890Sstevel@tonic-gate * update_utmpx_entry 19900Sstevel@tonic-gate * establish_user_environment 19910Sstevel@tonic-gate * print_banner 19920Sstevel@tonic-gate * display_last_login_time 19930Sstevel@tonic-gate * exec_the_shell 19940Sstevel@tonic-gate * 19950Sstevel@tonic-gate */ 19960Sstevel@tonic-gate 19970Sstevel@tonic-gate 19980Sstevel@tonic-gate /* 19990Sstevel@tonic-gate * adjust_nice - Set the nice (process priority) value if the 20000Sstevel@tonic-gate * gecos value contains an appropriate value. 20010Sstevel@tonic-gate */ 20020Sstevel@tonic-gate 20030Sstevel@tonic-gate static void 20040Sstevel@tonic-gate adjust_nice(void) 20050Sstevel@tonic-gate { 20060Sstevel@tonic-gate int pri, mflg, i; 20070Sstevel@tonic-gate 20080Sstevel@tonic-gate if (strncmp("pri=", pwd->pw_gecos, 4) == 0) { 20090Sstevel@tonic-gate pri = 0; 20100Sstevel@tonic-gate mflg = 0; 20110Sstevel@tonic-gate i = 4; 20120Sstevel@tonic-gate 20130Sstevel@tonic-gate if (pwd->pw_gecos[i] == '-') { 20140Sstevel@tonic-gate mflg++; 20150Sstevel@tonic-gate i++; 20160Sstevel@tonic-gate } 20170Sstevel@tonic-gate 20180Sstevel@tonic-gate while (pwd->pw_gecos[i] >= '0' && pwd->pw_gecos[i] <= '9') 20190Sstevel@tonic-gate pri = (pri * 10) + pwd->pw_gecos[i++] - '0'; 20200Sstevel@tonic-gate 20210Sstevel@tonic-gate if (mflg) 20220Sstevel@tonic-gate pri = -pri; 20230Sstevel@tonic-gate 20240Sstevel@tonic-gate (void) nice(pri); 20250Sstevel@tonic-gate } 20260Sstevel@tonic-gate } 20270Sstevel@tonic-gate 20280Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 20290Sstevel@tonic-gate /* 20300Sstevel@tonic-gate * update_utmpx_entry - Searchs for the correct utmpx entry, making an 20310Sstevel@tonic-gate * entry there if it finds one, otherwise exits. 20320Sstevel@tonic-gate */ 20330Sstevel@tonic-gate 20340Sstevel@tonic-gate static void 20350Sstevel@tonic-gate update_utmpx_entry(int sublogin) 20360Sstevel@tonic-gate { 20370Sstevel@tonic-gate int err; 20380Sstevel@tonic-gate char *user; 20390Sstevel@tonic-gate static char *errmsg = "No utmpx entry. " 20407324Sgww "You must exec \"login\" from the lowest level \"shell\"."; 2041*7688SAaron.Zang@Sun.COM int tmplen; 20420Sstevel@tonic-gate struct utmpx *u = (struct utmpx *)0; 20430Sstevel@tonic-gate struct utmpx utmpx; 2044*7688SAaron.Zang@Sun.COM char *ttyntail; 20450Sstevel@tonic-gate 20460Sstevel@tonic-gate /* 20470Sstevel@tonic-gate * If we're not a sublogin then 20480Sstevel@tonic-gate * we'll get an error back if our PID doesn't match the PID of the 20490Sstevel@tonic-gate * entry we are updating, otherwise if its a sublogin the flags 20500Sstevel@tonic-gate * field is set to 0, which means we just write a matching entry 20510Sstevel@tonic-gate * (without checking the pid), or a new entry if an entry doesn't 20520Sstevel@tonic-gate * exist. 20530Sstevel@tonic-gate */ 20540Sstevel@tonic-gate 20550Sstevel@tonic-gate if ((err = pam_open_session(pamh, 0)) != PAM_SUCCESS) { 20560Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + err; 20570Sstevel@tonic-gate login_exit(1); 20580Sstevel@tonic-gate } 20590Sstevel@tonic-gate 20600Sstevel@tonic-gate if ((err = pam_get_item(pamh, PAM_USER, (void **) &user)) != 20610Sstevel@tonic-gate PAM_SUCCESS) { 20620Sstevel@tonic-gate audit_error = ADT_FAIL_PAM + err; 20630Sstevel@tonic-gate login_exit(1); 20640Sstevel@tonic-gate } 20650Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 20660Sstevel@tonic-gate 20670Sstevel@tonic-gate (void) memset((void *)&utmpx, 0, sizeof (utmpx)); 20680Sstevel@tonic-gate (void) time(&utmpx.ut_tv.tv_sec); 20690Sstevel@tonic-gate utmpx.ut_pid = getpid(); 20700Sstevel@tonic-gate 20710Sstevel@tonic-gate if (rflag || hflag) { 20720Sstevel@tonic-gate SCPYN(utmpx.ut_host, remote_host); 20730Sstevel@tonic-gate tmplen = strlen(remote_host) + 1; 20740Sstevel@tonic-gate if (tmplen < sizeof (utmpx.ut_host)) 20750Sstevel@tonic-gate utmpx.ut_syslen = tmplen; 20760Sstevel@tonic-gate else 20770Sstevel@tonic-gate utmpx.ut_syslen = sizeof (utmpx.ut_host); 20780Sstevel@tonic-gate } else if (zflag) { 20790Sstevel@tonic-gate /* 20800Sstevel@tonic-gate * If this is a login from another zone, put the 20810Sstevel@tonic-gate * zone:<zonename> string in the utmpx entry. 20820Sstevel@tonic-gate */ 20830Sstevel@tonic-gate SCPYN(utmpx.ut_host, zone_name); 20840Sstevel@tonic-gate tmplen = strlen(zone_name) + 1; 20850Sstevel@tonic-gate if (tmplen < sizeof (utmpx.ut_host)) 20860Sstevel@tonic-gate utmpx.ut_syslen = tmplen; 20870Sstevel@tonic-gate else 20880Sstevel@tonic-gate utmpx.ut_syslen = sizeof (utmpx.ut_host); 20890Sstevel@tonic-gate } else { 20900Sstevel@tonic-gate utmpx.ut_syslen = 0; 20910Sstevel@tonic-gate } 20920Sstevel@tonic-gate 20930Sstevel@tonic-gate SCPYN(utmpx.ut_user, user); 20940Sstevel@tonic-gate 20950Sstevel@tonic-gate /* skip over "/dev/" */ 20960Sstevel@tonic-gate ttyntail = basename(ttyn); 20970Sstevel@tonic-gate 20980Sstevel@tonic-gate while ((u = getutxent()) != NULL) { 20990Sstevel@tonic-gate if ((u->ut_type == INIT_PROCESS || 21006646Srz201010 u->ut_type == LOGIN_PROCESS || 21016646Srz201010 u->ut_type == USER_PROCESS) && 21026646Srz201010 ((sublogin && strncmp(u->ut_line, ttyntail, 21036646Srz201010 sizeof (u->ut_line)) == 0) || 21046646Srz201010 u->ut_pid == login_pid)) { 21050Sstevel@tonic-gate SCPYN(utmpx.ut_line, (ttyn+sizeof ("/dev/")-1)); 21060Sstevel@tonic-gate (void) memcpy(utmpx.ut_id, u->ut_id, 21070Sstevel@tonic-gate sizeof (utmpx.ut_id)); 21080Sstevel@tonic-gate utmpx.ut_exit.e_exit = u->ut_exit.e_exit; 21090Sstevel@tonic-gate utmpx.ut_type = USER_PROCESS; 21100Sstevel@tonic-gate (void) pututxline(&utmpx); 21110Sstevel@tonic-gate break; 21120Sstevel@tonic-gate } 21130Sstevel@tonic-gate } 21140Sstevel@tonic-gate endutxent(); 21150Sstevel@tonic-gate 21160Sstevel@tonic-gate if (u == (struct utmpx *)NULL) { 21170Sstevel@tonic-gate if (!sublogin) { 21180Sstevel@tonic-gate /* 21190Sstevel@tonic-gate * no utmpx entry already setup 21200Sstevel@tonic-gate * (init or rlogind/telnetd) 21210Sstevel@tonic-gate */ 21220Sstevel@tonic-gate (void) puts(errmsg); 21230Sstevel@tonic-gate 21240Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_PROGRAM; 21250Sstevel@tonic-gate login_exit(1); 21260Sstevel@tonic-gate } 21270Sstevel@tonic-gate } else { 21280Sstevel@tonic-gate /* Now attempt to write out this entry to the wtmp file if */ 21290Sstevel@tonic-gate /* we were successful in getting it from the utmpx file and */ 21300Sstevel@tonic-gate /* the wtmp file exists. */ 21310Sstevel@tonic-gate updwtmpx(WTMPX_FILE, &utmpx); 21320Sstevel@tonic-gate } 21330Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 21340Sstevel@tonic-gate } 21350Sstevel@tonic-gate 21360Sstevel@tonic-gate 21370Sstevel@tonic-gate 21380Sstevel@tonic-gate /* 21390Sstevel@tonic-gate * process_chroot_logins - Chroots to the specified subdirectory and 21400Sstevel@tonic-gate * re executes login. 21410Sstevel@tonic-gate */ 21420Sstevel@tonic-gate 21430Sstevel@tonic-gate static int 21440Sstevel@tonic-gate process_chroot_logins(void) 21450Sstevel@tonic-gate { 21460Sstevel@tonic-gate /* 21470Sstevel@tonic-gate * If the shell field starts with a '*', do a chroot to the home 21480Sstevel@tonic-gate * directory and perform a new login. 21490Sstevel@tonic-gate */ 21500Sstevel@tonic-gate 21510Sstevel@tonic-gate if (*pwd->pw_shell == '*') { 21520Sstevel@tonic-gate (void) pam_end(pamh, PAM_SUCCESS); /* Done using PAM */ 21530Sstevel@tonic-gate pamh = NULL; /* really done */ 21540Sstevel@tonic-gate if (chroot(pwd->pw_dir) < 0) { 21550Sstevel@tonic-gate (void) printf("No Root Directory\n"); 21560Sstevel@tonic-gate 21570Sstevel@tonic-gate audit_failure(get_audit_id(), 21580Sstevel@tonic-gate ADT_FAIL_VALUE_CHDIR_FAILED, 21590Sstevel@tonic-gate pwd, remote_host, ttyn, zone_name); 21600Sstevel@tonic-gate 21610Sstevel@tonic-gate return (ERROR); 21620Sstevel@tonic-gate } 21630Sstevel@tonic-gate /* 21640Sstevel@tonic-gate * Set the environment flag <!sublogin> so that the next login 21650Sstevel@tonic-gate * knows that it is a sublogin. 21660Sstevel@tonic-gate */ 21670Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 21680Sstevel@tonic-gate envinit[0] = SUBLOGIN; 21690Sstevel@tonic-gate envinit[1] = (char *)NULL; 21700Sstevel@tonic-gate (void) printf("Subsystem root: %s\n", pwd->pw_dir); 21710Sstevel@tonic-gate (void) execle("/usr/bin/login", "login", (char *)0, 21727324Sgww &envinit[0]); 21730Sstevel@tonic-gate (void) execle("/etc/login", "login", (char *)0, &envinit[0]); 21740Sstevel@tonic-gate (void) printf("No /usr/bin/login or /etc/login on root\n"); 21750Sstevel@tonic-gate 21760Sstevel@tonic-gate audit_error = ADT_FAIL_VALUE_PROGRAM; 21770Sstevel@tonic-gate 21780Sstevel@tonic-gate login_exit(1); 21790Sstevel@tonic-gate } 21800Sstevel@tonic-gate return (OK); 21810Sstevel@tonic-gate /* ONC_PLUS EXTRACT START */ 21820Sstevel@tonic-gate } 21830Sstevel@tonic-gate 21840Sstevel@tonic-gate /* 21850Sstevel@tonic-gate * establish_user_environment - Set up the new users enviornment 21860Sstevel@tonic-gate */ 21870Sstevel@tonic-gate 21880Sstevel@tonic-gate static void 21890Sstevel@tonic-gate establish_user_environment(char **renvp) 21900Sstevel@tonic-gate { 21910Sstevel@tonic-gate int i, j, k, l_index, length, idx = 0; 21920Sstevel@tonic-gate char *endptr; 21930Sstevel@tonic-gate char **lenvp; 21940Sstevel@tonic-gate char **pam_env; 21950Sstevel@tonic-gate 21960Sstevel@tonic-gate lenvp = environ; 21970Sstevel@tonic-gate while (*lenvp++) 21980Sstevel@tonic-gate ; 21990Sstevel@tonic-gate 22000Sstevel@tonic-gate /* count the number of PAM environment variables set by modules */ 22010Sstevel@tonic-gate if ((pam_env = pam_getenvlist(pamh)) != 0) { 22020Sstevel@tonic-gate for (idx = 0; pam_env[idx] != 0; idx++) 22030Sstevel@tonic-gate ; 22040Sstevel@tonic-gate } 22050Sstevel@tonic-gate 22067324Sgww envinit = (char **)calloc(lenvp - environ + 10 + MAXARGS + idx, 22077324Sgww sizeof (char *)); 22080Sstevel@tonic-gate if (envinit == NULL) { 22090Sstevel@tonic-gate (void) printf("Calloc failed - out of swap space.\n"); 22100Sstevel@tonic-gate login_exit(8); 22110Sstevel@tonic-gate } 22120Sstevel@tonic-gate 22130Sstevel@tonic-gate /* 22140Sstevel@tonic-gate * add PAM environment variables first so they 22150Sstevel@tonic-gate * can be overwritten at login's discretion. 22160Sstevel@tonic-gate * check for illegal environment variables. 22170Sstevel@tonic-gate */ 22180Sstevel@tonic-gate idx = 0; basicenv = 0; 22190Sstevel@tonic-gate if (pam_env != 0) { 22200Sstevel@tonic-gate while (pam_env[idx] != 0) { 22210Sstevel@tonic-gate if (legalenvvar(pam_env[idx])) { 22220Sstevel@tonic-gate envinit[basicenv] = pam_env[idx]; 22230Sstevel@tonic-gate basicenv++; 22240Sstevel@tonic-gate } 22250Sstevel@tonic-gate idx++; 22260Sstevel@tonic-gate } 22270Sstevel@tonic-gate } 22280Sstevel@tonic-gate (void) memcpy(&envinit[basicenv], newenv, sizeof (newenv)); 22290Sstevel@tonic-gate /* ONC_PLUS EXTRACT END */ 22300Sstevel@tonic-gate 22310Sstevel@tonic-gate /* Set up environment */ 22320Sstevel@tonic-gate if (rflag) { 22330Sstevel@tonic-gate ENVSTRNCAT(term, terminal); 22340Sstevel@tonic-gate } else if (hflag) { 22350Sstevel@tonic-gate if (strlen(terminal)) { 22360Sstevel@tonic-gate ENVSTRNCAT(term, terminal); 22370Sstevel@tonic-gate } 22380Sstevel@tonic-gate } else { 22390Sstevel@tonic-gate char *tp = getenv("TERM"); 22400Sstevel@tonic-gate 22410Sstevel@tonic-gate if ((tp != NULL) && (*tp != '\0')) 22420Sstevel@tonic-gate ENVSTRNCAT(term, tp); 22430Sstevel@tonic-gate } 22440Sstevel@tonic-gate 22450Sstevel@tonic-gate ENVSTRNCAT(logname, pwd->pw_name); 22460Sstevel@tonic-gate 22470Sstevel@tonic-gate /* 22480Sstevel@tonic-gate * There are three places to get timezone info. init.c sets 22490Sstevel@tonic-gate * TZ if the file /etc/TIMEZONE contains a value for TZ. 22500Sstevel@tonic-gate * login.c looks in the file /etc/default/login for a 22510Sstevel@tonic-gate * variable called TIMEZONE being set. If TIMEZONE has a 22520Sstevel@tonic-gate * value, TZ is set to that value; no environment variable 22530Sstevel@tonic-gate * TIMEZONE is set, only TZ. If neither of these methods 22540Sstevel@tonic-gate * work to set TZ, then the library routines will default 22550Sstevel@tonic-gate * to using the file /usr/lib/locale/TZ/localtime. 22560Sstevel@tonic-gate * 22570Sstevel@tonic-gate * There is a priority set up here. If /etc/TIMEZONE has 22580Sstevel@tonic-gate * a value for TZ, that value remains top priority. If the 22590Sstevel@tonic-gate * file /etc/default/login has TIMEZONE set, that has second 22600Sstevel@tonic-gate * highest priority not overriding the value of TZ in 22610Sstevel@tonic-gate * /etc/TIMEZONE. The reason for this priority is that the 22620Sstevel@tonic-gate * file /etc/TIMEZONE is supposed to be sourced by 22630Sstevel@tonic-gate * /etc/profile. We are doing the "sourcing" prematurely in 22640Sstevel@tonic-gate * init.c. Additionally, a login C shell doesn't source the 22650Sstevel@tonic-gate * file /etc/profile thus not sourcing /etc/TIMEZONE thus not 22660Sstevel@tonic-gate * allowing an adminstrator to globally set TZ for all users 22670Sstevel@tonic-gate */ 22680Sstevel@tonic-gate if (Def_tz != NULL) /* Is there a TZ from defaults/login? */ 22690Sstevel@tonic-gate tmp_tz = Def_tz; 22700Sstevel@tonic-gate 22710Sstevel@tonic-gate if ((Def_tz = getenv("TZ")) != NULL) { 22720Sstevel@tonic-gate ENVSTRNCAT(timez, Def_tz); 22730Sstevel@tonic-gate } else if (tmp_tz != NULL) { 22740Sstevel@tonic-gate Def_tz = tmp_tz; 22750Sstevel@tonic-gate ENVSTRNCAT(timez, Def_tz); 22760Sstevel@tonic-gate } 22770Sstevel@tonic-gate 22780Sstevel@tonic-gate if (Def_hertz == NULL) 22790Sstevel@tonic-gate (void) sprintf(hertz + strlen(hertz), "%lu", HZ); 22800Sstevel@tonic-gate else 22810Sstevel@tonic-gate ENVSTRNCAT(hertz, Def_hertz); 22820Sstevel@tonic-gate 22830Sstevel@tonic-gate if (Def_path == NULL) 22840Sstevel@tonic-gate (void) strlcat(path, DEF_PATH, sizeof (path)); 22850Sstevel@tonic-gate else 22860Sstevel@tonic-gate ENVSTRNCAT(path, Def_path); 22870Sstevel@tonic-gate 22880Sstevel@tonic-gate ENVSTRNCAT(home, pwd->pw_dir); 22890Sstevel@tonic-gate 22900Sstevel@tonic-gate /* 22910Sstevel@tonic-gate * Find the end of the basic environment 22920Sstevel@tonic-gate */ 22930Sstevel@tonic-gate for (basicenv = 0; envinit[basicenv] != NULL; basicenv++) 22940Sstevel@tonic-gate ; 22950Sstevel@tonic-gate 22960Sstevel@tonic-gate /* 22970Sstevel@tonic-gate * If TZ has a value, add it. 22980Sstevel@tonic-gate */ 22990Sstevel@tonic-gate if (strcmp(timez, "TZ=") != 0) 23000Sstevel@tonic-gate envinit[basicenv++] = timez; 23010Sstevel@tonic-gate 23020Sstevel@tonic-gate if (*pwd->pw_shell == '\0') { 23030Sstevel@tonic-gate /* 23040Sstevel@tonic-gate * If possible, use the primary default shell, 23050Sstevel@tonic-gate * otherwise, use the secondary one. 23060Sstevel@tonic-gate */ 23070Sstevel@tonic-gate if (access(SHELL, X_OK) == 0) 23080Sstevel@tonic-gate pwd->pw_shell = SHELL; 23090Sstevel@tonic-gate else 23100Sstevel@tonic-gate pwd->pw_shell = SHELL2; 23110Sstevel@tonic-gate } else if (Altshell != NULL && strcmp(Altshell, "YES") == 0) { 23120Sstevel@tonic-gate envinit[basicenv++] = shell; 23130Sstevel@tonic-gate ENVSTRNCAT(shell, pwd->pw_shell); 23140Sstevel@tonic-gate } 23150Sstevel@tonic-gate 23160Sstevel@tonic-gate #ifndef NO_MAIL 23170Sstevel@tonic-gate envinit[basicenv++] = mail; 23180Sstevel@tonic-gate (void) strlcat(mail, pwd->pw_name, sizeof (mail)); 23190Sstevel@tonic-gate #endif 23200Sstevel@tonic-gate 23210Sstevel@tonic-gate /* 23220Sstevel@tonic-gate * Pick up locale environment variables, if any. 23230Sstevel@tonic-gate */ 23240Sstevel@tonic-gate lenvp = renvp; 23250Sstevel@tonic-gate while (*lenvp != NULL) { 23260Sstevel@tonic-gate j = 0; 23270Sstevel@tonic-gate while (localeenv[j] != 0) { 23280Sstevel@tonic-gate /* 23290Sstevel@tonic-gate * locale_envmatch() returns 1 if 23300Sstevel@tonic-gate * *lenvp is localenev[j] and valid. 23310Sstevel@tonic-gate */ 23320Sstevel@tonic-gate if (locale_envmatch(localeenv[j], *lenvp) == 1) { 23330Sstevel@tonic-gate envinit[basicenv++] = *lenvp; 23340Sstevel@tonic-gate break; 23350Sstevel@tonic-gate } 23360Sstevel@tonic-gate j++; 23370Sstevel@tonic-gate } 23380Sstevel@tonic-gate lenvp++; 23390Sstevel@tonic-gate } 23400Sstevel@tonic-gate 23410Sstevel@tonic-gate /* 23420Sstevel@tonic-gate * If '-p' flag, then try to pass on allowable environment 23430Sstevel@tonic-gate * variables. Note that by processing this first, what is 23440Sstevel@tonic-gate * passed on the final "login:" line may over-ride the invocation 23450Sstevel@tonic-gate * values. XXX is this correct? 23460Sstevel@tonic-gate */ 23470Sstevel@tonic-gate if (pflag) { 23480Sstevel@tonic-gate for (lenvp = renvp; *lenvp; lenvp++) { 23490Sstevel@tonic-gate if (!legalenvvar(*lenvp)) { 23500Sstevel@tonic-gate continue; 23510Sstevel@tonic-gate } 23520Sstevel@tonic-gate /* 23530Sstevel@tonic-gate * If this isn't 'xxx=yyy', skip it. XXX 23540Sstevel@tonic-gate */ 23550Sstevel@tonic-gate if ((endptr = strchr(*lenvp, '=')) == NULL) { 23560Sstevel@tonic-gate continue; 23570Sstevel@tonic-gate } 23580Sstevel@tonic-gate length = endptr + 1 - *lenvp; 23590Sstevel@tonic-gate for (j = 0; j < basicenv; j++) { 23600Sstevel@tonic-gate if (strncmp(envinit[j], *lenvp, length) == 0) { 23610Sstevel@tonic-gate /* 23620Sstevel@tonic-gate * Replace previously established value 23630Sstevel@tonic-gate */ 23640Sstevel@tonic-gate envinit[j] = *lenvp; 23650Sstevel@tonic-gate break; 23660Sstevel@tonic-gate } 23670Sstevel@tonic-gate } 23680Sstevel@tonic-gate if (j == basicenv) { 23690Sstevel@tonic-gate /* 23700Sstevel@tonic-gate * It's a new definition, so add it at the end. 23710Sstevel@tonic-gate */ 23720Sstevel@tonic-gate envinit[basicenv++] = *lenvp; 23730Sstevel@tonic-gate } 23740Sstevel@tonic-gate } 23750Sstevel@tonic-gate } 23760Sstevel@tonic-gate 23770Sstevel@tonic-gate /* 23780Sstevel@tonic-gate * Add in all the environment variables picked up from the 23790Sstevel@tonic-gate * argument list to "login" or from the user response to the 23800Sstevel@tonic-gate * "login" request, if any. 23810Sstevel@tonic-gate */ 23820Sstevel@tonic-gate 23830Sstevel@tonic-gate if (envp == NULL) 23840Sstevel@tonic-gate goto switch_env; /* done */ 23850Sstevel@tonic-gate 23860Sstevel@tonic-gate for (j = 0, k = 0, l_index = 0; 23877324Sgww *envp != NULL && j < (MAXARGS-1); 23887324Sgww j++, envp++) { 23890Sstevel@tonic-gate 23900Sstevel@tonic-gate /* 23910Sstevel@tonic-gate * Scan each string provided. If it doesn't have the 23920Sstevel@tonic-gate * format xxx=yyy, then add the string "Ln=" to the beginning. 23930Sstevel@tonic-gate */ 23940Sstevel@tonic-gate if ((endptr = strchr(*envp, '=')) == NULL) { 23950Sstevel@tonic-gate /* 23960Sstevel@tonic-gate * This much to be malloc'd: 23970Sstevel@tonic-gate * strlen(*envp) + 1 char for 'L' + 23980Sstevel@tonic-gate * MAXARGSWIDTH + 1 char for '=' + 1 for null char; 23990Sstevel@tonic-gate * 24000Sstevel@tonic-gate * total = strlen(*envp) + MAXARGSWIDTH + 3 24010Sstevel@tonic-gate */ 24020Sstevel@tonic-gate int total = strlen(*envp) + MAXARGSWIDTH + 3; 24030Sstevel@tonic-gate envinit[basicenv+k] = malloc(total); 24040Sstevel@tonic-gate if (envinit[basicenv+k] == NULL) { 24050Sstevel@tonic-gate (void) printf("%s: malloc failed\n", PROG_NAME); 24060Sstevel@tonic-gate login_exit(1); 24070Sstevel@tonic-gate } 24080Sstevel@tonic-gate (void) snprintf(envinit[basicenv+k], total, "L%d=%s", 24097324Sgww l_index, *envp); 24100Sstevel@tonic-gate 24110Sstevel@tonic-gate k++; 24120Sstevel@tonic-gate l_index++; 24130Sstevel@tonic-gate } else { 24140Sstevel@tonic-gate if (!legalenvvar(*envp)) { /* this env var permited? */ 24150Sstevel@tonic-gate continue; 24160Sstevel@tonic-gate } else { 24170Sstevel@tonic-gate 24180Sstevel@tonic-gate /* 24190Sstevel@tonic-gate * Check to see whether this string replaces 24200Sstevel@tonic-gate * any previously defined string 24210Sstevel@tonic-gate */ 24220Sstevel@tonic-gate for (i = 0, length = endptr + 1 - *envp; 24237324Sgww i < basicenv + k; i++) { 24247324Sgww if (strncmp(*envp, envinit[i], length) 24257324Sgww == 0) { 24267324Sgww envinit[i] = *envp; 24277324Sgww break; 24287324Sgww } 24290Sstevel@tonic-gate } 24300Sstevel@tonic-gate 24310Sstevel@tonic-gate /* 24320Sstevel@tonic-gate * If it doesn't, place it at the end of 24330Sstevel@tonic-gate * environment array. 24340Sstevel@tonic-gate */ 24350Sstevel@tonic-gate if (i == basicenv+k) { 24360Sstevel@tonic-gate envinit[basicenv+k] = *envp; 24370Sstevel@tonic-gate k++; 24380Sstevel@tonic-gate } 24390Sstevel@tonic-gate } 24400Sstevel@tonic-gate } 24410Sstevel@tonic-gate } /* for (j = 0 ... ) */ 24420Sstevel@tonic-gate 24430Sstevel@tonic-gate switch_env: 24440Sstevel@tonic-gate /* 24450Sstevel@tonic-gate * Switch to the new environment. 24460Sstevel@tonic-gate */ 24470Sstevel@tonic-gate environ = envinit; 24480Sstevel@tonic-gate } 24490Sstevel@tonic-gate 24500Sstevel@tonic-gate /* 24510Sstevel@tonic-gate * print_banner - Print the banner at start up 24520Sstevel@tonic-gate * Do not turn on DOBANNER ifdef. This is not 24530Sstevel@tonic-gate * relevant to SunOS. 24540Sstevel@tonic-gate */ 24550Sstevel@tonic-gate 24560Sstevel@tonic-gate static void 24570Sstevel@tonic-gate print_banner(void) 24580Sstevel@tonic-gate { 24590Sstevel@tonic-gate #ifdef DOBANNER 24600Sstevel@tonic-gate uname(&un); 24610Sstevel@tonic-gate #if i386 24620Sstevel@tonic-gate (void) printf("UNIX System V/386 Release %s\n%s\n" 24630Sstevel@tonic-gate "Copyright (C) 1984, 1986, 1987, 1988 AT&T\n" 24640Sstevel@tonic-gate "Copyright (C) 1987, 1988 Microsoft Corp.\nAll Rights Reserved\n", 24657324Sgww un.release, un.nodename); 24660Sstevel@tonic-gate #elif sun 24670Sstevel@tonic-gate (void) printf("SunOS Release %s Sun Microsystems %s\n%s\n" 24680Sstevel@tonic-gate "Copyright (c) 1984, 1986, 1987, 1988 AT&T\n" 24690Sstevel@tonic-gate "Copyright (c) 1988, 1989, 1990, 1991 Sun Microsystems\n" 24700Sstevel@tonic-gate "All Rights Reserved\n", 24717324Sgww un.release, un.machine, un.nodename); 24720Sstevel@tonic-gate #else 24730Sstevel@tonic-gate (void) printf("UNIX System V Release %s AT&T %s\n%s\n" 24740Sstevel@tonic-gate "Copyright (c) 1984, 1986, 1987, 1988 AT&T\nAll Rights Reserved\n", 24757324Sgww un.release, un.machine, un.nodename); 24760Sstevel@tonic-gate #endif /* i386 */ 24770Sstevel@tonic-gate #endif /* DOBANNER */ 24780Sstevel@tonic-gate } 24790Sstevel@tonic-gate 24800Sstevel@tonic-gate /* 24810Sstevel@tonic-gate * display_last_login_time - Advise the user the time and date 24820Sstevel@tonic-gate * that this login-id was last used. 24830Sstevel@tonic-gate */ 24840Sstevel@tonic-gate 24850Sstevel@tonic-gate static void 24860Sstevel@tonic-gate display_last_login_time(void) 24870Sstevel@tonic-gate { 24880Sstevel@tonic-gate if (lastlogok) { 24890Sstevel@tonic-gate (void) printf("Last login: %.*s ", 24-5, ctime(&ll.ll_time)); 24900Sstevel@tonic-gate 24910Sstevel@tonic-gate if (*ll.ll_host != '\0') 24920Sstevel@tonic-gate (void) printf("from %.*s\n", sizeof (ll.ll_host), 24937324Sgww ll.ll_host); 24940Sstevel@tonic-gate else 24950Sstevel@tonic-gate (void) printf("on %.*s\n", sizeof (ll.ll_line), 24967324Sgww ll.ll_line); 24970Sstevel@tonic-gate } 24980Sstevel@tonic-gate } 24990Sstevel@tonic-gate 25000Sstevel@tonic-gate /* 25010Sstevel@tonic-gate * exec_the_shell - invoke the specified shell or start up program 25020Sstevel@tonic-gate */ 25030Sstevel@tonic-gate 25040Sstevel@tonic-gate static void 25050Sstevel@tonic-gate exec_the_shell(void) 25060Sstevel@tonic-gate { 25070Sstevel@tonic-gate char *endptr; 25080Sstevel@tonic-gate int i; 25090Sstevel@tonic-gate 25100Sstevel@tonic-gate (void) strlcat(minusnam, basename(pwd->pw_shell), 25117324Sgww sizeof (minusnam)); 25120Sstevel@tonic-gate 25130Sstevel@tonic-gate /* 25140Sstevel@tonic-gate * Exec the shell 25150Sstevel@tonic-gate */ 25160Sstevel@tonic-gate (void) execl(pwd->pw_shell, minusnam, (char *)0); 25170Sstevel@tonic-gate 25180Sstevel@tonic-gate /* 25190Sstevel@tonic-gate * pwd->pw_shell was not an executable object file, maybe it 25200Sstevel@tonic-gate * is a shell proceedure or a command line with arguments. 25210Sstevel@tonic-gate * If so, turn off the SHELL= environment variable. 25220Sstevel@tonic-gate */ 25230Sstevel@tonic-gate for (i = 0; envinit[i] != NULL; ++i) { 25240Sstevel@tonic-gate if ((envinit[i] == shell) && 25250Sstevel@tonic-gate ((endptr = strchr(shell, '=')) != NULL)) 25260Sstevel@tonic-gate (*++endptr) = '\0'; 25270Sstevel@tonic-gate } 25280Sstevel@tonic-gate 25290Sstevel@tonic-gate if (access(pwd->pw_shell, R_OK|X_OK) == 0) { 25300Sstevel@tonic-gate (void) execl(SHELL, "sh", pwd->pw_shell, (char *)0); 25310Sstevel@tonic-gate (void) execl(SHELL2, "sh", pwd->pw_shell, (char *)0); 25320Sstevel@tonic-gate } 25330Sstevel@tonic-gate 25340Sstevel@tonic-gate (void) printf("No shell\n"); 25350Sstevel@tonic-gate } 25360Sstevel@tonic-gate 25370Sstevel@tonic-gate /* 25380Sstevel@tonic-gate * login_exit - Call exit() and terminate. 25390Sstevel@tonic-gate * This function is here for PAM so cleanup can 25400Sstevel@tonic-gate * be done before the process exits. 25410Sstevel@tonic-gate */ 25420Sstevel@tonic-gate static void 25430Sstevel@tonic-gate login_exit(int exit_code) 25440Sstevel@tonic-gate { 25450Sstevel@tonic-gate if (pamh) 25460Sstevel@tonic-gate (void) pam_end(pamh, PAM_ABORT); 25470Sstevel@tonic-gate 25480Sstevel@tonic-gate if (audit_error) 25490Sstevel@tonic-gate audit_failure(get_audit_id(), audit_error, 25500Sstevel@tonic-gate pwd, remote_host, ttyn, zone_name); 25510Sstevel@tonic-gate 25520Sstevel@tonic-gate exit(exit_code); 25530Sstevel@tonic-gate /*NOTREACHED*/ 25540Sstevel@tonic-gate } 25550Sstevel@tonic-gate 25560Sstevel@tonic-gate /* 25570Sstevel@tonic-gate * Check if lenv and penv matches or not. 25580Sstevel@tonic-gate */ 25590Sstevel@tonic-gate static int 25600Sstevel@tonic-gate locale_envmatch(char *lenv, char *penv) 25610Sstevel@tonic-gate { 25620Sstevel@tonic-gate while ((*lenv == *penv) && *lenv && *penv != '=') { 25630Sstevel@tonic-gate lenv++; 25640Sstevel@tonic-gate penv++; 25650Sstevel@tonic-gate } 25660Sstevel@tonic-gate 25670Sstevel@tonic-gate /* 25680Sstevel@tonic-gate * '/' is eliminated for security reason. 25690Sstevel@tonic-gate */ 25700Sstevel@tonic-gate if (*lenv == '\0' && *penv == '=' && *(penv + 1) != '/') 25710Sstevel@tonic-gate return (1); 25720Sstevel@tonic-gate return (0); 25730Sstevel@tonic-gate } 25740Sstevel@tonic-gate 25750Sstevel@tonic-gate static int 25760Sstevel@tonic-gate is_number(char *ptr) 25770Sstevel@tonic-gate { 25780Sstevel@tonic-gate while (*ptr != '\0') { 25790Sstevel@tonic-gate if (!isdigit(*ptr)) 25800Sstevel@tonic-gate return (0); 25810Sstevel@tonic-gate ptr++; 25820Sstevel@tonic-gate } 25830Sstevel@tonic-gate return (1); 25840Sstevel@tonic-gate } 2585