summaryrefslogtreecommitdiffstats
path: root/src/responder
diff options
context:
space:
mode:
authorSumit Bose <sbose@redhat.com>2010-02-09 12:39:49 +0100
committerStephen Gallagher <sgallagh@redhat.com>2010-03-11 09:05:50 -0500
commit5a88e963744e5da453e88b5c36499f04712df097 (patch)
tree1afc7d9fab016d91c050558d92f5e5deb6f0eab3 /src/responder
parentce8e76190d96612961ef7e83fda74f1146a5fb12 (diff)
downloadsssd-5a88e963744e5da453e88b5c36499f04712df097.tar.gz
sssd-5a88e963744e5da453e88b5c36499f04712df097.tar.xz
sssd-5a88e963744e5da453e88b5c36499f04712df097.zip
Add better checks on PAM socket
- check if the public socket belongs to root and has 0666 permissions - use a SCM_CREDENTIALS message if available
Diffstat (limited to 'src/responder')
-rw-r--r--src/responder/common/responder.h4
-rw-r--r--src/responder/common/responder_common.c133
2 files changed, 136 insertions, 1 deletions
diff --git a/src/responder/common/responder.h b/src/responder/common/responder.h
index ea6ba5831..6391fcf7c 100644
--- a/src/responder/common/responder.h
+++ b/src/responder/common/responder.h
@@ -101,6 +101,10 @@ struct cli_ctx {
struct cli_request *creq;
struct cli_protocol_version *cli_protocol_version;
int priv;
+ int creds_exchange_done;
+ int client_uid;
+ int client_gid;
+ int client_pid;
};
struct sss_cmd_table {
diff --git a/src/responder/common/responder_common.c b/src/responder/common/responder_common.c
index f524afb93..f4de3a79e 100644
--- a/src/responder/common/responder_common.c
+++ b/src/responder/common/responder_common.c
@@ -19,6 +19,9 @@
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
+/* for struct ucred */
+#define _GNU_SOURCE
+
#include <stdio.h>
#include <unistd.h>
#include <fcntl.h>
@@ -29,7 +32,8 @@
#include <string.h>
#include <sys/time.h>
#include <errno.h>
-#include "popt.h"
+#include <popt.h>
+#include "config.h"
#include "util/util.h"
#include "db/sysdb.h"
#include "confdb/confdb.h"
@@ -144,12 +148,130 @@ static void client_recv(struct tevent_context *ev, struct cli_ctx *cctx)
return;
}
+static void cred_handler(struct cli_ctx *cctx, char action)
+{
+#ifdef HAVE_UCRED
+ int ret;
+ int fd;
+ struct msghdr msg;
+ struct iovec iov;
+ struct cmsghdr *cmsg;
+ struct ucred *creds;
+ char buf[CMSG_SPACE(sizeof(struct ucred))];
+ char dummy='s';
+ int enable=1;
+
+ if (cctx->creds_exchange_done != 0) {
+ DEBUG(1, ("cred_handler called, but creds are already exchanged.\n"));
+ goto failed;
+ }
+
+ fd = cctx->cfd;
+
+ iov.iov_base = &dummy;
+ iov.iov_len = 1;
+
+ memset (&msg, 0, sizeof(msg));
+
+ msg.msg_name = NULL;
+ msg.msg_namelen = 0;
+ msg.msg_iov = &iov;
+ msg.msg_iovlen = 1;
+
+ msg.msg_control = buf;
+ msg.msg_controllen = sizeof(buf);
+
+ switch (action) {
+ case 'r':
+ ret = setsockopt(fd, SOL_SOCKET, SO_PASSCRED, &enable, sizeof(int));
+ if (ret == -1) {
+ DEBUG(1, ("setsockopt failed: [%d][%s].\n", errno,
+ strerror(errno)));
+ goto failed;
+ }
+
+ ret = recvmsg(fd, &msg, 0);
+ if (ret == -1) {
+ DEBUG(1, ("recvmsg failed.[%d][%s]\n", errno, strerror(errno)));
+ goto failed;
+ }
+
+ cmsg = CMSG_FIRSTHDR(&msg);
+
+ if (cmsg->cmsg_level == SOL_SOCKET &&
+ cmsg->cmsg_type == SCM_CREDENTIALS) {
+ creds = (struct ucred *) CMSG_DATA(cmsg);
+ DEBUG(1, ("creds: [%d][%d][%d]\n",creds->uid, creds->gid,
+ creds->pid));
+ cctx->client_uid = creds->uid;
+ cctx->client_gid = creds->gid;
+ cctx->client_pid = creds->pid;
+ }
+
+ TEVENT_FD_WRITEABLE(cctx->cfde);
+
+ return;
+ break;
+ case 's':
+ cmsg = CMSG_FIRSTHDR(&msg);
+ cmsg->cmsg_level = SOL_SOCKET;
+ cmsg->cmsg_type = SCM_CREDENTIALS;
+ cmsg->cmsg_len = CMSG_LEN(sizeof(struct ucred));
+
+ creds = (struct ucred *) CMSG_DATA(cmsg);
+
+ creds->uid = geteuid();
+ creds->gid = getegid();
+ creds->pid = getpid();
+
+ msg.msg_controllen = cmsg->cmsg_len;
+
+ ret = sendmsg(fd, &msg, 0);
+ if (ret == -1) {
+ DEBUG(1, ("sendmsg failed.[%d][%s]\n", errno, strerror(errno)));
+ goto failed;
+ }
+ DEBUG(4, ("Send creds to the client succesfully.\n"));
+ cctx->creds_exchange_done = 1;
+
+ TEVENT_FD_NOT_WRITEABLE(cctx->cfde);
+ return;
+ default:
+ DEBUG(1, ("Unknown action [%c].\n", action));
+ goto failed;
+ }
+
+failed:
+ talloc_free(cctx);
+ return;
+
+#else
+
+ DEBUG(9, ("Credential exchange not available over socket, "
+ "continuing without.\n"));
+ cctx->creds_exchange_done = 1;
+ return;
+
+#endif
+}
+
static void client_fd_handler(struct tevent_context *ev,
struct tevent_fd *fde,
uint16_t flags, void *ptr)
{
struct cli_ctx *cctx = talloc_get_type(ptr, struct cli_ctx);
+ if (cctx->creds_exchange_done == 0) {
+ if (flags & TEVENT_FD_READ) {
+ cred_handler(cctx, 'r');
+ return;
+ }
+ if (flags & TEVENT_FD_WRITE) {
+ cred_handler(cctx, 's');
+ return;
+ }
+ }
+
if (flags & TEVENT_FD_READ) {
client_recv(ev, cctx);
return;
@@ -213,6 +335,10 @@ static void accept_priv_fd_handler(struct tevent_context *ev,
}
cctx->priv = 1;
+ cctx->creds_exchange_done = 0;
+ cctx->client_uid = -1;
+ cctx->client_gid = -1;
+ cctx->client_pid = -1;
cctx->cfde = tevent_add_fd(ev, cctx, cctx->cfd,
TEVENT_FD_READ, client_fd_handler, cctx);
@@ -265,6 +391,11 @@ static void accept_fd_handler(struct tevent_context *ev,
return;
}
+ cctx->creds_exchange_done = 0;
+ cctx->client_uid = -1;
+ cctx->client_gid = -1;
+ cctx->client_pid = -1;
+
cctx->cfde = tevent_add_fd(ev, cctx, cctx->cfd,
TEVENT_FD_READ, client_fd_handler, cctx);
if (!cctx->cfde) {