From 5a88e963744e5da453e88b5c36499f04712df097 Mon Sep 17 00:00:00 2001 From: Sumit Bose Date: Tue, 9 Feb 2010 12:39:49 +0100 Subject: Add better checks on PAM socket - check if the public socket belongs to root and has 0666 permissions - use a SCM_CREDENTIALS message if available --- src/responder/common/responder.h | 4 + src/responder/common/responder_common.c | 133 +++++++++++++++++++++++++++++++- 2 files changed, 136 insertions(+), 1 deletion(-) (limited to 'src/responder') diff --git a/src/responder/common/responder.h b/src/responder/common/responder.h index ea6ba5831..6391fcf7c 100644 --- a/src/responder/common/responder.h +++ b/src/responder/common/responder.h @@ -101,6 +101,10 @@ struct cli_ctx { struct cli_request *creq; struct cli_protocol_version *cli_protocol_version; int priv; + int creds_exchange_done; + int client_uid; + int client_gid; + int client_pid; }; struct sss_cmd_table { diff --git a/src/responder/common/responder_common.c b/src/responder/common/responder_common.c index f524afb93..f4de3a79e 100644 --- a/src/responder/common/responder_common.c +++ b/src/responder/common/responder_common.c @@ -19,6 +19,9 @@ along with this program. If not, see . */ +/* for struct ucred */ +#define _GNU_SOURCE + #include #include #include @@ -29,7 +32,8 @@ #include #include #include -#include "popt.h" +#include +#include "config.h" #include "util/util.h" #include "db/sysdb.h" #include "confdb/confdb.h" @@ -144,12 +148,130 @@ static void client_recv(struct tevent_context *ev, struct cli_ctx *cctx) return; } +static void cred_handler(struct cli_ctx *cctx, char action) +{ +#ifdef HAVE_UCRED + int ret; + int fd; + struct msghdr msg; + struct iovec iov; + struct cmsghdr *cmsg; + struct ucred *creds; + char buf[CMSG_SPACE(sizeof(struct ucred))]; + char dummy='s'; + int enable=1; + + if (cctx->creds_exchange_done != 0) { + DEBUG(1, ("cred_handler called, but creds are already exchanged.\n")); + goto failed; + } + + fd = cctx->cfd; + + iov.iov_base = &dummy; + iov.iov_len = 1; + + memset (&msg, 0, sizeof(msg)); + + msg.msg_name = NULL; + msg.msg_namelen = 0; + msg.msg_iov = &iov; + msg.msg_iovlen = 1; + + msg.msg_control = buf; + msg.msg_controllen = sizeof(buf); + + switch (action) { + case 'r': + ret = setsockopt(fd, SOL_SOCKET, SO_PASSCRED, &enable, sizeof(int)); + if (ret == -1) { + DEBUG(1, ("setsockopt failed: [%d][%s].\n", errno, + strerror(errno))); + goto failed; + } + + ret = recvmsg(fd, &msg, 0); + if (ret == -1) { + DEBUG(1, ("recvmsg failed.[%d][%s]\n", errno, strerror(errno))); + goto failed; + } + + cmsg = CMSG_FIRSTHDR(&msg); + + if (cmsg->cmsg_level == SOL_SOCKET && + cmsg->cmsg_type == SCM_CREDENTIALS) { + creds = (struct ucred *) CMSG_DATA(cmsg); + DEBUG(1, ("creds: [%d][%d][%d]\n",creds->uid, creds->gid, + creds->pid)); + cctx->client_uid = creds->uid; + cctx->client_gid = creds->gid; + cctx->client_pid = creds->pid; + } + + TEVENT_FD_WRITEABLE(cctx->cfde); + + return; + break; + case 's': + cmsg = CMSG_FIRSTHDR(&msg); + cmsg->cmsg_level = SOL_SOCKET; + cmsg->cmsg_type = SCM_CREDENTIALS; + cmsg->cmsg_len = CMSG_LEN(sizeof(struct ucred)); + + creds = (struct ucred *) CMSG_DATA(cmsg); + + creds->uid = geteuid(); + creds->gid = getegid(); + creds->pid = getpid(); + + msg.msg_controllen = cmsg->cmsg_len; + + ret = sendmsg(fd, &msg, 0); + if (ret == -1) { + DEBUG(1, ("sendmsg failed.[%d][%s]\n", errno, strerror(errno))); + goto failed; + } + DEBUG(4, ("Send creds to the client succesfully.\n")); + cctx->creds_exchange_done = 1; + + TEVENT_FD_NOT_WRITEABLE(cctx->cfde); + return; + default: + DEBUG(1, ("Unknown action [%c].\n", action)); + goto failed; + } + +failed: + talloc_free(cctx); + return; + +#else + + DEBUG(9, ("Credential exchange not available over socket, " + "continuing without.\n")); + cctx->creds_exchange_done = 1; + return; + +#endif +} + static void client_fd_handler(struct tevent_context *ev, struct tevent_fd *fde, uint16_t flags, void *ptr) { struct cli_ctx *cctx = talloc_get_type(ptr, struct cli_ctx); + if (cctx->creds_exchange_done == 0) { + if (flags & TEVENT_FD_READ) { + cred_handler(cctx, 'r'); + return; + } + if (flags & TEVENT_FD_WRITE) { + cred_handler(cctx, 's'); + return; + } + } + if (flags & TEVENT_FD_READ) { client_recv(ev, cctx); return; @@ -213,6 +335,10 @@ static void accept_priv_fd_handler(struct tevent_context *ev, } cctx->priv = 1; + cctx->creds_exchange_done = 0; + cctx->client_uid = -1; + cctx->client_gid = -1; + cctx->client_pid = -1; cctx->cfde = tevent_add_fd(ev, cctx, cctx->cfd, TEVENT_FD_READ, client_fd_handler, cctx); @@ -265,6 +391,11 @@ static void accept_fd_handler(struct tevent_context *ev, return; } + cctx->creds_exchange_done = 0; + cctx->client_uid = -1; + cctx->client_gid = -1; + cctx->client_pid = -1; + cctx->cfde = tevent_add_fd(ev, cctx, cctx->cfd, TEVENT_FD_READ, client_fd_handler, cctx); if (!cctx->cfde) { -- cgit