i unused
[unix-history] / usr / src / usr.bin / login / login.c
index f43add8..926be83 100644 (file)
@@ -1,5 +1,5 @@
 /*
 /*
- * Copyright (c) 1980 Regents of the University of California.
+ * Copyright (c) 1980,1987 Regents of the University of California.
  * All rights reserved.  The Berkeley software License Agreement
  * specifies the terms and conditions for redistribution.
  */
  * All rights reserved.  The Berkeley software License Agreement
  * specifies the terms and conditions for redistribution.
  */
@@ -11,13 +11,14 @@ char copyright[] =
 #endif not lint
 
 #ifndef lint
 #endif not lint
 
 #ifndef lint
-static char sccsid[] = "@(#)login.c    5.1 (Berkeley) %G%";
+static char sccsid[] = "@(#)login.c    5.21 (Berkeley) %G%";
 #endif not lint
 
 /*
  * login [ name ]
 #endif not lint
 
 /*
  * login [ name ]
- * login -r hostname (for rlogind)
- * login -h hostname (for telnetd, etc.)
+ * login -r hostname   (for rlogind)
+ * login -h hostname   (for telnetd, etc.)
+ * login -f name       (for pre-authenticated login: datakit, xterm, etc.)
  */
 
 #include <sys/param.h>
  */
 
 #include <sys/param.h>
@@ -36,11 +37,16 @@ static char sccsid[] = "@(#)login.c 5.1 (Berkeley) %G%";
 #include <errno.h>
 #include <ttyent.h>
 #include <syslog.h>
 #include <errno.h>
 #include <ttyent.h>
 #include <syslog.h>
+#include <grp.h>
+
+#define TTYGRPNAME     "tty"           /* name of group to own ttys */
+#define TTYGID(gid)    tty_gid(gid)    /* gid that owns all ttys */
 
 #define        SCMPN(a, b)     strncmp(a, b, sizeof(a))
 #define        SCPYN(a, b)     strncpy(a, b, sizeof(a))
 
 #define NMAX   sizeof(utmp.ut_name)
 
 #define        SCMPN(a, b)     strncmp(a, b, sizeof(a))
 #define        SCPYN(a, b)     strncpy(a, b, sizeof(a))
 
 #define NMAX   sizeof(utmp.ut_name)
+#define HMAX   sizeof(utmp.ut_host)
 
 #define        FALSE   0
 #define        TRUE    -1
 
 #define        FALSE   0
 #define        TRUE    -1
@@ -53,23 +59,22 @@ struct      passwd nouser = {"", "nope", -1, -1, -1, "", "", "", "" };
 struct sgttyb ttyb;
 struct utmp utmp;
 char   minusnam[16] = "-";
 struct sgttyb ttyb;
 struct utmp utmp;
 char   minusnam[16] = "-";
-char   *envinit[] = { 0 };             /* now set by setenv calls */
+char   *envinit[1];                    /* now set by setenv calls */
 /*
  * This bounds the time given to login.  We initialize it here
  * so it can be patched on machines where it's too small.
  */
 /*
  * This bounds the time given to login.  We initialize it here
  * so it can be patched on machines where it's too small.
  */
-int    timeout = 60;
+int    timeout = 300;
 
 char   term[64];
 
 struct passwd *pwd;
 
 char   term[64];
 
 struct passwd *pwd;
-char   *strcat(), *rindex(), *index(), *malloc(), *realloc();
+char   *strcat(), *rindex(), *index();
 int    timedout();
 char   *ttyname();
 char   *crypt();
 char   *getpass();
 char   *stypeof();
 int    timedout();
 char   *ttyname();
 char   *crypt();
 char   *getpass();
 char   *stypeof();
-extern char **environ;
 extern int errno;
 
 struct tchars tc = {
 extern int errno;
 
 struct tchars tc = {
@@ -82,21 +87,24 @@ struct      ltchars ltc = {
 struct winsize win = { 0, 0, 0, 0 };
 
 int    rflag;
 struct winsize win = { 0, 0, 0, 0 };
 
 int    rflag;
+int    usererr = -1;
 char   rusername[NMAX+1], lusername[NMAX+1];
 char   rpassword[NMAX+1];
 char   name[NMAX+1];
 char   rusername[NMAX+1], lusername[NMAX+1];
 char   rpassword[NMAX+1];
 char   name[NMAX+1];
+char   me[MAXHOSTNAMELEN];
 char   *rhost;
 
 main(argc, argv)
        char *argv[];
 {
 char   *rhost;
 
 main(argc, argv)
        char *argv[];
 {
+       extern  char **environ;
        register char *namep;
        register char *namep;
-       int pflag = 0, hflag = 0, t, f, c;
+       int pflag = 0, hflag = 0, fflag = 0, t, f, c;
        int invalid, quietlog;
        FILE *nlfd;
        char *ttyn, *tty;
        int invalid, quietlog;
        FILE *nlfd;
        char *ttyn, *tty;
-       int ldisc = 0, zero = 0, i;
-       char **envnew;
+       int ldisc = 0, zero = 0;
+       char *p, *domain, *index();
 
        signal(SIGALRM, timedout);
        alarm(timeout);
 
        signal(SIGALRM, timedout);
        alarm(timeout);
@@ -107,25 +115,63 @@ main(argc, argv)
        /*
         * -p is used by getty to tell login not to destroy the environment
         * -r is used by rlogind to cause the autologin protocol;
        /*
         * -p is used by getty to tell login not to destroy the environment
         * -r is used by rlogind to cause the autologin protocol;
+        * -f is used to skip a second login authentication 
         * -h is used by other servers to pass the name of the
         * remote host to login so that it may be placed in utmp and wtmp
         */
         * -h is used by other servers to pass the name of the
         * remote host to login so that it may be placed in utmp and wtmp
         */
-       if (argc > 1) {
+       (void) gethostname(me, sizeof(me));
+       domain = index(me, '.');
+       while (argc > 1) {
                if (strcmp(argv[1], "-r") == 0) {
                if (strcmp(argv[1], "-r") == 0) {
-                       rflag = doremotelogin(argv[2]);
+                       if (rflag || hflag || fflag) {
+                               printf("Other options not allowed with -r\n");
+                               exit(1);
+                       }
+                       if (argv[2] == 0)
+                               exit(1);
+                       rflag = 1;
+                       usererr = doremotelogin(argv[2]);
+                       if ((p = index(argv[2], '.')) && strcmp(p, domain) == 0)
+                               *p = 0;
                        SCPYN(utmp.ut_host, argv[2]);
                        SCPYN(utmp.ut_host, argv[2]);
-                       argc = 0;
+                       argc -= 2;
+                       argv += 2;
+                       continue;
                }
                }
-               if (strcmp(argv[1], "-h") == 0 && getuid() == 0) {
-                       hflag = 1;
-                       SCPYN(utmp.ut_host, argv[2]);
-                       argc = 0;
+               if (strcmp(argv[1], "-h") == 0) {
+                       if (getuid() == 0) {
+                               if (rflag || hflag) {
+                                   printf("Only one of -r and -h allowed\n");
+                                   exit(1);
+                               }
+                               hflag = 1;
+                               if ((p = index(argv[2], '.')) &&
+                                   strcmp(p, domain) == 0)
+                                       *p = 0;
+                               SCPYN(utmp.ut_host, argv[2]);
+                       }
+                       argc -= 2;
+                       argv += 2;
+                       continue;
+               }
+               if (strcmp(argv[1], "-f") == 0 && argc > 2) {
+                       if (rflag) {
+                               printf("Only one of -r and -f allowed\n");
+                               exit(1);
+                       }
+                       fflag = 1;
+                       SCPYN(utmp.ut_name, argv[2]);
+                       argc -= 2;
+                       argv += 2;
+                       continue;
                }
                if (strcmp(argv[1], "-p") == 0) {
                        argc--;
                        argv++;
                        pflag = 1;
                }
                if (strcmp(argv[1], "-p") == 0) {
                        argc--;
                        argv++;
                        pflag = 1;
+                       continue;
                }
                }
+               break;
        }
        ioctl(0, TIOCLSET, &zero);
        ioctl(0, TIOCNXCL, 0);
        }
        ioctl(0, TIOCLSET, &zero);
        ioctl(0, TIOCNXCL, 0);
@@ -139,26 +185,29 @@ main(argc, argv)
         */
        if (rflag)
                doremoteterm(term, &ttyb);
         */
        if (rflag)
                doremoteterm(term, &ttyb);
+       ttyb.sg_erase = CERASE;
+       ttyb.sg_kill = CKILL;
        ioctl(0, TIOCSLTC, &ltc);
        ioctl(0, TIOCSETC, &tc);
        ioctl(0, TIOCSETP, &ttyb);
        ioctl(0, TIOCSLTC, &ltc);
        ioctl(0, TIOCSETC, &tc);
        ioctl(0, TIOCSETP, &ttyb);
-       for (t = getdtablesize(); t > 3; t--)
+       for (t = getdtablesize(); t > 2; t--)
                close(t);
        ttyn = ttyname(0);
                close(t);
        ttyn = ttyname(0);
-       if (ttyn == (char *)0)
+       if (ttyn == (char *)0 || *ttyn == '\0')
                ttyn = "/dev/tty??";
        tty = rindex(ttyn, '/');
        if (tty == NULL)
                tty = ttyn;
        else
                tty++;
                ttyn = "/dev/tty??";
        tty = rindex(ttyn, '/');
        if (tty == NULL)
                tty = ttyn;
        else
                tty++;
-       openlog("login", LOG_ODELAY, 0);
+       openlog("login", LOG_ODELAY, LOG_AUTH);
        t = 0;
        t = 0;
+       invalid = FALSE;
        do {
                ldisc = 0;
                ioctl(0, TIOCSETD, &ldisc);
        do {
                ldisc = 0;
                ioctl(0, TIOCSETD, &ldisc);
-               invalid = FALSE;
-               SCPYN(utmp.ut_name, "");
+               if (fflag == 0)
+                       SCPYN(utmp.ut_name, "");
                /*
                 * Name specified, take it.
                 */
                /*
                 * Name specified, take it.
                 */
@@ -170,23 +219,38 @@ main(argc, argv)
                 * If remote login take given name,
                 * otherwise prompt user for something.
                 */
                 * If remote login take given name,
                 * otherwise prompt user for something.
                 */
-               if (rflag) {
+               if (rflag && !invalid)
                        SCPYN(utmp.ut_name, lusername);
                        SCPYN(utmp.ut_name, lusername);
-                       /* autologin failed, prompt for passwd */
-                       if (rflag == -1)
-                               rflag = 0;
-               } else
+               else {
                        getloginname(&utmp);
                        getloginname(&utmp);
+                       if (utmp.ut_name[0] == '-') {
+                               puts("login names may not start with '-'.");
+                               invalid = TRUE;
+                               continue;
+                       }
+               }
+               invalid = FALSE;
                if (!strcmp(pwd->pw_shell, "/bin/csh")) {
                        ldisc = NTTYDISC;
                        ioctl(0, TIOCSETD, &ldisc);
                }
                if (!strcmp(pwd->pw_shell, "/bin/csh")) {
                        ldisc = NTTYDISC;
                        ioctl(0, TIOCSETD, &ldisc);
                }
+               if (fflag) {
+                       int uid = getuid();
+
+                       if (uid != 0 && uid != pwd->pw_uid)
+                               fflag = 0;
+                       /*
+                        * Disallow automatic login for root.
+                        */
+                       if (pwd->pw_uid == 0)
+                               fflag = 0;
+               }
                /*
                 * If no remote login authentication and
                 * a password exists for this user, prompt
                 * for one and verify it.
                 */
                /*
                 * If no remote login authentication and
                 * a password exists for this user, prompt
                 * for one and verify it.
                 */
-               if (!rflag && *pwd->pw_passwd != '\0') {
+               if (usererr == -1 && fflag == 0 && *pwd->pw_passwd != '\0') {
                        char *pp;
 
                        setpriority(PRIO_PROCESS, 0, -4);
                        char *pp;
 
                        setpriority(PRIO_PROCESS, 0, -4);
@@ -211,15 +275,27 @@ main(argc, argv)
                 * see if root logins on this terminal are permitted.
                 */
                if (!invalid && pwd->pw_uid == 0 && !rootterm(tty)) {
                 * see if root logins on this terminal are permitted.
                 */
                if (!invalid && pwd->pw_uid == 0 && !rootterm(tty)) {
-                       syslog(LOG_SECURITY, "ROOT LOGIN REFUSED %s", tty);
+                       if (utmp.ut_host[0])
+                               syslog(LOG_CRIT,
+                                   "ROOT LOGIN REFUSED ON %s FROM %.*s",
+                                   tty, HMAX, utmp.ut_host);
+                       else
+                               syslog(LOG_CRIT,
+                                   "ROOT LOGIN REFUSED ON %s", tty);
                        invalid = TRUE;
                }
                if (invalid) {
                        printf("Login incorrect\n");
                        if (++t >= 5) {
                        invalid = TRUE;
                }
                if (invalid) {
                        printf("Login incorrect\n");
                        if (++t >= 5) {
-                               syslog(LOG_SECURITY,
-                                   "REPEATED LOGIN FAILURES %s, %s",
-                                       tty, utmp.ut_name);
+                               if (utmp.ut_host[0])
+                                       syslog(LOG_ERR,
+                           "REPEATED LOGIN FAILURES ON %s FROM %.*s, %.*s",
+                                           tty, HMAX, utmp.ut_host,
+                                           NMAX, utmp.ut_name);
+                               else
+                                       syslog(LOG_ERR,
+                                   "REPEATED LOGIN FAILURES ON %s, %.*s",
+                                               tty, NMAX, utmp.ut_name);
                                ioctl(0, TIOCHPCL, (struct sgttyb *) 0);
                                close(0), close(1), close(2);
                                sleep(10);
                                ioctl(0, TIOCHPCL, (struct sgttyb *) 0);
                                close(0), close(1), close(2);
                                sleep(10);
@@ -242,13 +318,13 @@ main(argc, argv)
                 * Remote login invalid must have been because
                 * of a restriction of some sort, no extra chances.
                 */
                 * Remote login invalid must have been because
                 * of a restriction of some sort, no extra chances.
                 */
-               if (rflag && invalid)
+               if (!usererr && invalid)
                        exit(1);
        } while (invalid);
 /* committed to login turn off timeout */
        alarm(0);
 
                        exit(1);
        } while (invalid);
 /* committed to login turn off timeout */
        alarm(0);
 
-       if (quota(Q_SETUID, pwd->pw_uid, 0, 0) < 0) {
+       if (quota(Q_SETUID, pwd->pw_uid, 0, 0) < 0 && errno != EINVAL) {
                if (errno == EUSERS)
                        printf("%s.\n%s.\n",
                           "Too many users logged on already",
                if (errno == EUSERS)
                        printf("%s.\n%s.\n",
                           "Too many users logged on already",
@@ -295,37 +371,27 @@ main(argc, argv)
                write(f, (char *) &ll, sizeof ll);
                close(f);
        }
                write(f, (char *) &ll, sizeof ll);
                close(f);
        }
-       chown(ttyn, pwd->pw_uid, pwd->pw_gid);
-       if (!hflag)                                     /* XXX */
+       chown(ttyn, pwd->pw_uid, TTYGID(pwd->pw_gid));
+       if (!hflag && !rflag)                                   /* XXX */
                ioctl(0, TIOCSWINSZ, &win);
                ioctl(0, TIOCSWINSZ, &win);
-       chmod(ttyn, 0622);
+       chmod(ttyn, 0620);
        setgid(pwd->pw_gid);
        strncpy(name, utmp.ut_name, NMAX);
        name[NMAX] = '\0';
        initgroups(name, pwd->pw_gid);
        quota(Q_DOWARN, pwd->pw_uid, (dev_t)-1, 0);
        setuid(pwd->pw_uid);
        setgid(pwd->pw_gid);
        strncpy(name, utmp.ut_name, NMAX);
        name[NMAX] = '\0';
        initgroups(name, pwd->pw_gid);
        quota(Q_DOWARN, pwd->pw_uid, (dev_t)-1, 0);
        setuid(pwd->pw_uid);
+
        /* destroy environment unless user has asked to preserve it */
        if (!pflag)
                environ = envinit;
        /* destroy environment unless user has asked to preserve it */
        if (!pflag)
                environ = envinit;
-
-       /* set up environment, this time without destruction */
-       /* copy the environment before setenving */
-       i = 0;
-       while (environ[i] != NULL)
-               i++;
-       envnew = (char **) malloc(sizeof (char *) * (i + 1));
-       for (; i >= 0; i--)
-               envnew[i] = environ[i];
-       environ = envnew;
-
-       setenv("HOME=", pwd->pw_dir);
-       setenv("SHELL=", pwd->pw_shell);
+       setenv("HOME", pwd->pw_dir, 1);
+       setenv("SHELL", pwd->pw_shell, 1);
        if (term[0] == '\0')
                strncpy(term, stypeof(tty), sizeof(term));
        if (term[0] == '\0')
                strncpy(term, stypeof(tty), sizeof(term));
-       setenv("TERM=", term);
-       setenv("USER=", pwd->pw_name);
-       setenv("PATH=", ":/usr/ucb:/bin:/usr/bin");
+       setenv("TERM", term, 0);
+       setenv("USER", pwd->pw_name, 1);
+       setenv("PATH", ":/usr/ucb:/bin:/usr/bin", 0);
 
        if ((namep = rindex(pwd->pw_shell, '/')) == NULL)
                namep = pwd->pw_shell;
 
        if ((namep = rindex(pwd->pw_shell, '/')) == NULL)
                namep = pwd->pw_shell;
@@ -335,7 +401,11 @@ main(argc, argv)
        if (tty[sizeof("tty")-1] == 'd')
                syslog(LOG_INFO, "DIALUP %s, %s", tty, pwd->pw_name);
        if (pwd->pw_uid == 0)
        if (tty[sizeof("tty")-1] == 'd')
                syslog(LOG_INFO, "DIALUP %s, %s", tty, pwd->pw_name);
        if (pwd->pw_uid == 0)
-               syslog(LOG_SECURITY, "ROOT LOGIN %s", tty);
+               if (utmp.ut_host[0])
+                       syslog(LOG_NOTICE, "ROOT LOGIN %s FROM %.*s",
+                           tty, HMAX, utmp.ut_host);
+               else
+                       syslog(LOG_NOTICE, "ROOT LOGIN %s", tty);
        if (!quietlog) {
                struct stat st;
 
        if (!quietlog) {
                struct stat st;
 
@@ -437,75 +507,19 @@ stypeof(ttyid)
 doremotelogin(host)
        char *host;
 {
 doremotelogin(host)
        char *host;
 {
-       FILE *hostf;
-       int first = 1;
-
        getstr(rusername, sizeof (rusername), "remuser");
        getstr(lusername, sizeof (lusername), "locuser");
        getstr(term, sizeof(term), "Terminal type");
        if (getuid()) {
                pwd = &nouser;
        getstr(rusername, sizeof (rusername), "remuser");
        getstr(lusername, sizeof (lusername), "locuser");
        getstr(term, sizeof(term), "Terminal type");
        if (getuid()) {
                pwd = &nouser;
-               goto bad;
+               return(-1);
        }
        pwd = getpwnam(lusername);
        if (pwd == NULL) {
                pwd = &nouser;
        }
        pwd = getpwnam(lusername);
        if (pwd == NULL) {
                pwd = &nouser;
-               goto bad;
-       }
-       hostf = pwd->pw_uid ? fopen("/etc/hosts.equiv", "r") : 0;
-again:
-       if (hostf) {
-               char ahost[32];
-
-               while (fgets(ahost, sizeof (ahost), hostf)) {
-                       register char *p;
-                       char *user;
-
-                       p = ahost;
-                       while (*p != '\n' && *p != ' ' && *p != '\t' && *p != '\0')
-                               p++;
-                       if (*p == ' ' || *p == '\t') {
-                               *p++ = '\0';
-                               while (*p == ' ' || *p == '\t')
-                                       p++;
-                               user = p;
-                               while (*p != '\n' && *p != ' ' && *p != '\t' && *p != '\0')
-                                       p++;
-                       } else
-                               user = p;
-                       *p = '\0';
-                       if (!strcmp(host, ahost) &&
-                           !strcmp(rusername, *user ? user : lusername)) {
-                               fclose(hostf);
-                               return (1);
-                       }
-               }
-               fclose(hostf);
-       }
-       if (first == 1) {
-               char *rhosts = ".rhosts";
-               struct stat sbuf;
-
-               first = 0;
-               if (chdir(pwd->pw_dir) < 0)
-                       goto again;
-               if (lstat(rhosts, &sbuf) < 0)
-                       goto again;
-               if ((sbuf.st_mode & S_IFMT) == S_IFLNK) {
-                       printf("login: .rhosts is a soft link.\r\n");
-                       goto bad;
-               }
-               hostf = fopen(rhosts, "r");
-               fstat(fileno(hostf), &sbuf);
-               if (sbuf.st_uid && sbuf.st_uid != pwd->pw_uid) {
-                       printf("login: Bad .rhosts ownership.\r\n");
-                       fclose(hostf);
-                       goto bad;
-               }
-               goto again;
+               return(-1);
        }
        }
-bad:
-       return (-1);
+       return(ruserok(host, (pwd->pw_uid == 0), rusername, lusername));
 }
 
 getstr(buf, cnt, err)
 }
 
 getstr(buf, cnt, err)
@@ -537,7 +551,6 @@ doremoteterm(term, tp)
 {
        register char *cp = index(term, '/'), **cpp;
        char *speed;
 {
        register char *cp = index(term, '/'), **cpp;
        char *speed;
-       struct winsize ws;
 
        if (cp) {
                *cp++ = '\0';
 
        if (cp) {
                *cp++ = '\0';
@@ -550,62 +563,21 @@ doremoteterm(term, tp)
                                tp->sg_ispeed = tp->sg_ospeed = cpp-speeds;
                                break;
                        }
                                tp->sg_ispeed = tp->sg_ospeed = cpp-speeds;
                                break;
                        }
-               ws.ws_row = ws.ws_col = -1;
-               ws.ws_xpixel = ws.ws_ypixel = -1;
-               if (cp) {
-                       ws.ws_row = atoi(cp);
-                       cp = index(cp, ',');
-                       if (cp == 0)
-                               goto done;
-                       ws.ws_col = atoi(++cp);
-                       cp = index(cp, ',');
-                       if (cp == 0)
-                               goto done;
-                       ws.ws_xpixel = atoi(++cp);
-                       cp = index(cp, ',');
-                       if (cp == 0)
-                               goto done;
-                       ws.ws_ypixel = atoi(++cp);
-               }
-done:
-               if (ws.ws_row != -1 && ws.ws_col != -1 &&
-                   ws.ws_xpixel != -1 && ws.ws_ypixel != -1)
-                       win = ws;
        }
        tp->sg_flags = ECHO|CRMOD|ANYP|XTABS;
 }
 
        }
        tp->sg_flags = ECHO|CRMOD|ANYP|XTABS;
 }
 
-/*
- * Set the value of var to be arg in the Unix 4.2 BSD environment env.
- * Var should end with '='.
- * (bindings are of the form "var=value")
- * This procedure assumes the memory for the first level of environ
- * was allocated using malloc.
- */
-setenv(var, value)
-       char *var, *value;
+tty_gid(default_gid)
+       int default_gid;
 {
 {
-       extern char **environ;
-       int index = 0;
-       int varlen = strlen(var);
-       int vallen = strlen(value);
-
-       for (index = 0; environ[index] != NULL; index++) {
-               if (strncmp(environ[index], var, varlen) == 0) {
-                       /* found it */
-                       environ[index] = malloc(varlen + vallen + 1);
-                       strcpy(environ[index], var);
-                       strcat(environ[index], value);
-                       return;
-               }
-       }
-       environ = (char **) realloc(environ, sizeof (char *) * (index + 2));
-       if (environ == NULL) {
-               fprintf(stderr, "login: malloc out of memory\n");
-               exit(1);
-       }
-       environ[index] = malloc(varlen + vallen + 1);
-       strcpy(environ[index], var);
-       strcat(environ[index], value);
-       environ[++index] = NULL;
+       struct group *getgrnam(), *gr;
+       int gid = default_gid;
+
+       gr = getgrnam(TTYGRPNAME);
+       if (gr != (struct group *) 0)
+               gid = gr->gr_gid;
+
+       endgrent();
+
+       return (gid);
 }
 }