/**
* cerberus – Minimal login program
*
* Copyright © 2013 Mattias Andrée (maandree@member.fsf.org)
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see .
*/
#include
#include
#include
#include
#include
#include
#include "config.h"
#include "pam.h"
#define __failed(RC) ((RC) != PAM_SUCCESS)
void quit_pam(int sig);
int conv_pam(int num_msg, const struct pam_message** msg, struct pam_response** resp, void* appdata_ptr);
/**
* Old signal action for SIGHUP
*/
struct sigaction signal_action_hup;
/**
* Old signal action for SIGTERM
*/
struct sigaction signal_action_term;
/**
* The process ID of the child process, 0 if none
*/
extern pid_t child_pid;
/**
* The PAM handle
*/
static pam_handle_t* handle = NULL;
/**
* The PAM convention
*/
static struct pam_conv conv = { conv_pam, NULL };
/**
* Whether the user was auto-authenticated
*/
static char auto_authenticated = 1;
/**
* Function that can be used to read a passphrase from the terminal
*/
static char* (*passphrase_reader)(void) = NULL;
/**
* Exit if a PAM instruction failed
*
* @param rc What the PAM instruction return
*/
static void do_pam(int rc)
{
if (__failed(rc))
{
const char* msg = pam_strerror(handle, rc);
if (msg)
fprintf(stderr, "%s\n", msg);
pam_end(handle, rc);
sleep(ERROR_SLEEP);
_exit(1);
}
}
/**
* Initialise PAM
*
* @param remote The remote computer, {@code NULL} for local login
* @param username The username of the user to log in to
* @param reader Function that can be used to read a passphrase from the terminal
*/
void initialise_pam(char* remote, char* username, char* (*reader)(void))
{
passphrase_reader = reader;
if (pam_start(remote ? "remote" : "local", username, &conv, &handle) != PAM_SUCCESS)
{
fprintf(stderr, "Cannot initialise PAM\n");
sleep(ERROR_SLEEP);
_exit(1);
}
do_pam(pam_set_item(handle, PAM_RHOST, remote ?: "localhost"));
do_pam(pam_set_item(handle, PAM_TTY, ttyname(STDIN_FILENO) ?: "(none)"));
}
/**
* Verify that the account may be used
*/
void verify_account_pam(void)
{
int rc = pam_acct_mgmt(handle, 0);
if (rc == PAM_NEW_AUTHTOK_REQD)
rc = pam_chauthtok(handle, PAM_CHANGE_EXPIRED_AUTHTOK);
do_pam(rc);
}
/**
* Open PAM session
*/
void open_session_pam(void)
{
int rc;
char** env;
struct sigaction signal_action;
do_pam(pam_setcred(handle, PAM_ESTABLISH_CRED));
if (__failed(rc = pam_open_session(handle, 0)))
{
pam_setcred(handle, PAM_DELETE_CRED);
do_pam(rc);
}
if (__failed(rc = pam_setcred(handle, PAM_REINITIALIZE_CRED)))
{
pam_close_session(handle, 0);
do_pam(rc);
}
memset(&signal_action, 0, sizeof(signal_action));
signal_action.sa_handler = SIG_IGN;
sigaction(SIGINT, &signal_action, NULL);
sigaction(SIGHUP, &signal_action, &signal_action_hup);
signal_action.sa_handler = quit_pam;
sigaction(SIGHUP, &signal_action, NULL);
sigaction(SIGTERM, &signal_action, &signal_action_term);
for (env = pam_getenvlist(handle); env && *env; env++)
if (putenv(*env))
{
pam_setcred(handle, PAM_DELETE_CRED);
pam_end(handle, pam_close_session(handle, 0));
sleep(ERROR_SLEEP);
_exit(1);
}
}
/**
* Close PAM session
*/
void close_session_pam(void)
{
sigaction(SIGHUP, &signal_action_hup, NULL);
sigaction(SIGTERM, &signal_action_term, NULL);
pam_setcred(handle, PAM_DELETE_CRED);
pam_end(handle, pam_close_session(handle, 0));
}
/**
* Signal handler for cleanly exit PAM session
*
* @param sig The received signal
*/
void quit_pam(int sig)
{
if (child_pid)
kill(-child_pid, sig);
if (sig == SIGTERM)
kill(-child_pid, SIGHUP);
pam_setcred(handle, PAM_DELETE_CRED);
pam_end(handle, pam_close_session(handle, 0));
_exit(sig);
}
/**
* Perform token authentication
*
* @return Whether the user got automatically authenticated
*/
char authenticate_pam(void)
{
int rc;
if (__failed(rc = pam_authenticate(handle, 0)))
{
printf("Incorrect passphrase\n");
pam_end(handle, rc);
sleep(FAILURE_SLEEP);
_exit(1);
}
return auto_authenticated;
}
/**
* Callback function for converation between PAM this application
*
* @param num_msg Number of pointers in the array `msg`
* @param msg Message from PAM
* @param resp Pointer to responses to PAM for by index corresponding messages
* @param appdata_ptr (Not used)
* @return `PAM_SUCCESS`, `PAM_CONV_ERR` or `PAM_BUF_ERR`
*/
int conv_pam(int num_msg, const struct pam_message** msg, struct pam_response** resp, void* appdata_ptr)
{
int i;
(void) appdata_ptr;
*resp = calloc(num_msg, sizeof(struct pam_response));
for (i = 0; i < num_msg; i++)
{
((*resp) + i)->resp = NULL;
((*resp) + i)->resp_retcode = 0;
if ((**(msg + i)).msg_style == PAM_PROMPT_ECHO_OFF)
{
(*resp + i)->resp = passphrase_reader();
auto_authenticated = 0;
}
}
return PAM_SUCCESS;
}