* Copyright (c) 1980,1987 Regents of the University of California.
* All rights reserved. The Berkeley software License Agreement
* specifies the terms and conditions for redistribution.
"@(#) Copyright (c) 1980 Regents of the University of California.\n\
static char sccsid[] = "@(#)login.c.1 5.23 (Berkeley) %G%";
* login -r hostname (for rlogind)
* login -h hostname (for telnetd, etc.)
* login -f name (for pre-authenticated login: datakit, xterm, etc.)
#include <sys/resource.h>
#define TTYGRPNAME "tty" /* name of group to own ttys */
#define TTYGID(gid) tty_gid(gid) /* gid that owns all ttys */
#define SCMPN(a, b) strncmp(a, b, sizeof(a))
#define SCPYN(a, b) strncpy(a, b, sizeof(a))
#define NMAX sizeof(utmp.ut_name)
#define HMAX sizeof(utmp.ut_host)
char nolog[] = "/etc/nologin";
char qlog[] = ".hushlogin";
char maildir[30] = "/usr/spool/mail/";
char lastlog[] = "/usr/adm/lastlog";
struct passwd nouser = {"", "nope", -1, -1, -1, "", "", "", "" };
char *envinit[1]; /* now set by setenv calls */
* This bounds the time given to login. We initialize it here
* so it can be patched on machines where it's too small.
char *strcat(), *rindex(), *index();
CINTR, CQUIT, CSTART, CSTOP, CEOT, CBRK
CSUSP, CDSUSP, CRPRNT, CFLUSH, CWERASE, CLNEXT
struct winsize win = { 0, 0, 0, 0 };
char rusername[NMAX+1], lusername[NMAX+1];
int pflag = 0, hflag = 0, fflag = 0, t, f, c;
char *p, *domain, *index();
signal(SIGALRM, timedout);
signal(SIGQUIT, SIG_IGN);
setpriority(PRIO_PROCESS, 0, 0);
quota(Q_SETUID, 0, 0, 0);
* -p is used by getty to tell login not to destroy the environment
* -r is used by rlogind to cause the autologin protocol;
* -f is used to skip a second login authentication
* -h is used by other servers to pass the name of the
* remote host to login so that it may be placed in utmp and wtmp
(void) gethostname(me, sizeof(me));
if (strcmp(argv[1], "-r") == 0) {
if (rflag || hflag || fflag) {
printf("Other options not allowed with -r\n");
usererr = doremotelogin(argv[2]);
if ((p = index(argv[2], '.')) && strcmp(p, domain) == 0)
SCPYN(utmp.ut_host, argv[2]);
if (strcmp(argv[1], "-h") == 0) {
printf("Only one of -r and -h allowed\n");
if ((p = index(argv[2], '.')) &&
SCPYN(utmp.ut_host, argv[2]);
if (strcmp(argv[1], "-f") == 0 && argc > 2) {
printf("Only one of -r and -f allowed\n");
SCPYN(utmp.ut_name, argv[2]);
if (strcmp(argv[1], "-p") == 0) {
ioctl(0, TIOCLSET, &zero);
ioctl(0, FIONBIO, &zero);
ioctl(0, FIOASYNC, &zero);
ioctl(0, TIOCGETP, &ttyb);
* If talking to an rlogin process,
* propagate the terminal type and
* baud rate across the network.
doremoteterm(term, &ttyb);
ioctl(0, TIOCSLTC, <c);
ioctl(0, TIOCSETP, &ttyb);
for (t = getdtablesize(); t > 2; t--)
if (ttyn == (char *)0 || *ttyn == '\0')
openlog("login", LOG_ODELAY, LOG_AUTH);
ioctl(0, TIOCSETD, &ldisc);
* Name specified, take it.
SCPYN(utmp.ut_name, argv[1]);
* If remote login take given name,
* otherwise prompt user for something.
SCPYN(utmp.ut_name, lusername);
if (utmp.ut_name[0] == '-') {
puts("login names may not start with '-'.");
if (!strcmp(pwd->pw_shell, "/bin/csh")) {
ioctl(0, TIOCSETD, &ldisc);
if (uid != 0 && uid != pwd->pw_uid)
* Disallow automatic login for root.
* If no remote login authentication and
* a password exists for this user, prompt
if (usererr == -1 && fflag == 0 && *pwd->pw_passwd != '\0') {
setpriority(PRIO_PROCESS, 0, -4);
pp = getpass("Password:");
namep = crypt(pp, pwd->pw_passwd);
setpriority(PRIO_PROCESS, 0, 0);
if (strcmp(namep, pwd->pw_passwd))
* If user not super-user, check for logins disabled.
if (pwd->pw_uid != 0 && (nlfd = fopen(nolog, "r"))) {
while ((c = getc(nlfd)) != EOF)
* If valid so far and root is logging in,
* see if root logins on this terminal are permitted.
if (!invalid && pwd->pw_uid == 0 && !rootterm(tty)) {
"ROOT LOGIN REFUSED ON %s FROM %.*s",
tty, HMAX, utmp.ut_host);
"ROOT LOGIN REFUSED ON %s", tty);
printf("Login incorrect\n");
"REPEATED LOGIN FAILURES ON %s FROM %.*s, %.*s",
"REPEATED LOGIN FAILURES ON %s, %.*s",
tty, NMAX, utmp.ut_name);
ioctl(0, TIOCHPCL, (struct sgttyb *) 0);
close(0), close(1), close(2);
if (*pwd->pw_shell == '\0')
pwd->pw_shell = "/bin/sh";
if (chdir(pwd->pw_dir) < 0 && !invalid ) {
printf("No directory!\n");
printf("No directory! %s\n",
"Logging in with home=/");
* Remote login invalid must have been because
* of a restriction of some sort, no extra chances.
/* committed to login turn off timeout */
if (quota(Q_SETUID, pwd->pw_uid, 0, 0) < 0 && errno != EINVAL) {
"Too many users logged on already",
else if (errno == EPROCLIM)
printf("You have too many processes running.\n");
perror("quota (Q_SETUID)");
SCPYN(utmp.ut_line, tty);
quietlog = access(qlog, F_OK) == 0;
if ((f = open(lastlog, O_RDWR)) >= 0) {
lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);
if (read(f, (char *) &ll, sizeof ll) == sizeof ll &&
ll.ll_time != 0 && !quietlog) {
printf("Last login: %.*s ",
24-5, (char *)ctime(&ll.ll_time));
sizeof (ll.ll_host), ll.ll_host);
sizeof (ll.ll_line), ll.ll_line);
lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);
SCPYN(ll.ll_host, utmp.ut_host);
write(f, (char *) &ll, sizeof ll);
chown(ttyn, pwd->pw_uid, TTYGID(pwd->pw_gid));
if (!hflag && !rflag) /* XXX */
ioctl(0, TIOCSWINSZ, &win);
strncpy(name, utmp.ut_name, NMAX);
initgroups(name, pwd->pw_gid);
quota(Q_DOWARN, pwd->pw_uid, (dev_t)-1, 0);
/* destroy environment unless user has asked to preserve it */
setenv("HOME", pwd->pw_dir, 1);
setenv("SHELL", pwd->pw_shell, 1);
strncpy(term, stypeof(tty), sizeof(term));
setenv("USER", pwd->pw_name, 1);
setenv("PATH", ":/usr/ucb:/bin:/usr/bin", 0);
if ((namep = rindex(pwd->pw_shell, '/')) == NULL)
if (tty[sizeof("tty")-1] == 'd')
syslog(LOG_INFO, "DIALUP %s, %s", tty, pwd->pw_name);
syslog(LOG_NOTICE, "ROOT LOGIN %s FROM %.*s",
tty, HMAX, utmp.ut_host);
syslog(LOG_NOTICE, "ROOT LOGIN %s", tty);
strcat(maildir, pwd->pw_name);
if (stat(maildir, &st) == 0 && st.st_size != 0)
printf("You have %smail.\n",
(st.st_mtime > st.st_atime) ? "new " : "");
signal(SIGALRM, SIG_DFL);
signal(SIGQUIT, SIG_DFL);
signal(SIGTSTP, SIG_IGN);
execlp(pwd->pw_shell, minusnam, 0);
register struct utmp *up;
while (up->ut_name[0] == '\0') {
while ((c = getchar()) != '\n') {
if (namep < up->ut_name+NMAX)
strncpy(lusername, up->ut_name, NMAX);
if ((pwd = getpwnam(lusername)) == NULL)
printf("Login timed out after %d seconds\n", timeout);
register struct ttyent *t;
if ((t = getttynam(tty)) != NULL) {
if (t->ty_status & TTY_SECURE)
if ((mf = fopen("/etc/motd", "r")) != NULL) {
while ((c = getc(mf)) != EOF && stopmotd == 0)
register struct ttyent *t;
if (ttyid == NULL || (t = getttynam(ttyid)) == NULL)
getstr(rusername, sizeof (rusername), "remuser");
getstr(lusername, sizeof (lusername), "locuser");
getstr(term, sizeof(term), "Terminal type");
pwd = getpwnam(lusername);
return(ruserok(host, (pwd->pw_uid == 0), rusername, lusername));
printf("%s too long\r\n", err);
{ "0", "50", "75", "110", "134", "150", "200", "300",
"600", "1200", "1800", "2400", "4800", "9600", "19200", "38400" };
#define NSPEEDS (sizeof (speeds) / sizeof (speeds[0]))
register char *cp = index(term, '/'), **cpp;
for (cpp = speeds; cpp < &speeds[NSPEEDS]; cpp++)
if (strcmp(*cpp, speed) == 0) {
tp->sg_ispeed = tp->sg_ospeed = cpp-speeds;
tp->sg_flags = ECHO|CRMOD|ANYP|XTABS;
struct group *getgrnam(), *gr;
gr = getgrnam(TTYGRPNAME);
if (gr != (struct group *) 0)