diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 14:54:37 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 14:54:37 +0000 |
commit | 97c26c1924b076ef23ebe4381558e8aa025712b2 (patch) | |
tree | 109724175f07436696f51b14b5abbd3f4d704d6d /src/sulogin.c | |
parent | Initial commit. (diff) | |
download | shadow-97c26c1924b076ef23ebe4381558e8aa025712b2.tar.xz shadow-97c26c1924b076ef23ebe4381558e8aa025712b2.zip |
Adding upstream version 1:4.13+dfsg1.upstream/1%4.13+dfsg1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/sulogin.c')
-rw-r--r-- | src/sulogin.c | 237 |
1 files changed, 237 insertions, 0 deletions
diff --git a/src/sulogin.c b/src/sulogin.c new file mode 100644 index 0000000..2c5e094 --- /dev/null +++ b/src/sulogin.c @@ -0,0 +1,237 @@ +/* + * SPDX-FileCopyrightText: 1989 - 1994, Julianne Frances Haugh + * SPDX-FileCopyrightText: 1996 - 2000, Marek Michałkiewicz + * SPDX-FileCopyrightText: 2002 - 2006, Tomasz Kłoczko + * SPDX-FileCopyrightText: 2007 - 2010, Nicolas François + * + * SPDX-License-Identifier: BSD-3-Clause + */ + +#include <config.h> + +#ident "$Id$" + +#include <fcntl.h> +#include <pwd.h> +#include <signal.h> +#include <stdio.h> +#include <sys/ioctl.h> +#include "defines.h" +#include "getdef.h" +#include "prototypes.h" +#include "pwauth.h" +/*@-exitarg@*/ +#include "exitcodes.h" +#include "shadowlog.h" + +/* + * Global variables + */ +const char *Prog; + +static char name[BUFSIZ]; +static char pass[BUFSIZ]; + +static struct passwd pwent; + +extern char **newenvp; +extern size_t newenvc; + +extern char **environ; + +#ifndef ALARM +#define ALARM 60 +#endif + +/* local function prototypes */ +static void catch_signals (int); + +static void catch_signals (unused int sig) +{ + _exit (1); +} + +/* + * syslogd is usually not running at the time when sulogin is typically + * called, cluttering the screen with unnecessary messages. Suggested by + * Ivan Nejgebauer <ian@unsux.ns.ac.yu>. --marekm + */ +#undef USE_SYSLOG + + /*ARGSUSED*/ int main (int argc, char **argv) +{ +#ifndef USE_PAM + const char *env; +#endif /* !USE_PAM */ + char **envp = environ; + TERMIO termio; + int err = 0; + +#ifdef USE_TERMIO + ioctl (0, TCGETA, &termio); + termio.c_iflag |= (ICRNL | IXON); + termio.c_oflag |= (OPOST | ONLCR); + termio.c_cflag |= (CREAD); + termio.c_lflag |= (ISIG | ICANON | ECHO | ECHOE | ECHOK); + ioctl (0, TCSETAF, &termio); +#endif +#ifdef USE_TERMIOS + tcgetattr (0, &termio); + termio.c_iflag |= (ICRNL | IXON); + termio.c_oflag |= (CREAD); + termio.c_lflag |= (ECHO | ECHOE | ECHOK | ICANON | ISIG); + tcsetattr (0, TCSANOW, &termio); +#endif + + Prog = Basename (argv[0]); + log_set_progname(Prog); + log_set_logfd(stderr); + (void) setlocale (LC_ALL, ""); + (void) bindtextdomain (PACKAGE, LOCALEDIR); + (void) textdomain (PACKAGE); + +#ifdef USE_SYSLOG + OPENLOG ("sulogin"); +#endif + initenv (); + if (argc > 1) { + close (0); + close (1); + close (2); + + if (open (argv[1], O_RDWR) >= 0) { + dup (0); + dup (0); + } else { +#ifdef USE_SYSLOG + SYSLOG (LOG_WARN, "cannot open %s\n", argv[1]); + closelog (); +#endif + exit (1); + } + } + if (access (PASSWD_FILE, F_OK) == -1) { /* must be a password file! */ + (void) puts (_("No password file")); +#ifdef USE_SYSLOG + SYSLOG (LOG_WARN, "No password file\n"); + closelog (); +#endif + exit (1); + } +#if !defined(DEBUG) && defined(SULOGIN_ONLY_INIT) + if (getppid () != 1) { /* parent must be INIT */ +#ifdef USE_SYSLOG + SYSLOG (LOG_WARN, "Pid == %d, not 1\n", getppid ()); + closelog (); +#endif + exit (1); + } +#endif + if ((isatty (0) == 0) || (isatty (1) == 0) || (isatty (2) == 0)) { +#ifdef USE_SYSLOG + closelog (); +#endif + exit (1); /* must be a terminal */ + } + /* If we were init, we need to start a new session */ + if (getppid() == 1) { + setsid(); + if (ioctl(0, TIOCSCTTY, 1) != 0) { + (void) fputs (_("TIOCSCTTY failed"), stderr); + } + } + while (NULL != *envp) { /* add inherited environment, */ + addenv (*envp, NULL); /* some variables change later */ + envp++; + } + +#ifndef USE_PAM + env = getdef_str ("ENV_TZ"); + if (NULL != env) { + addenv (('/' == *env) ? tz (env) : env, NULL); + } + env = getdef_str ("ENV_HZ"); + if (NULL != env) { + addenv (env, NULL); /* set the default $HZ, if one */ + } +#endif /* !USE_PAM */ + + (void) strcpy (name, "root"); /* KLUDGE!!! */ + + (void) signal (SIGALRM, catch_signals); /* exit if the timer expires */ + (void) alarm (ALARM); /* only wait so long ... */ + + while (true) { /* repeatedly get login/password pairs */ + char *cp; + pw_entry (name, &pwent); /* get entry from password file */ + if (pwent.pw_name == (char *) 0) { + /* + * Fail secure + */ + (void) puts (_("No password entry for 'root'")); +#ifdef USE_SYSLOG + SYSLOG (LOG_WARN, "No password entry for 'root'\n"); + closelog (); +#endif + exit (1); + } + + /* + * Here we prompt for the root password, or if no password + * is given we just exit. + */ + + /* get a password for root */ + cp = getpass (_( +"\n" +"Type control-d to proceed with normal startup,\n" +"(or give root password for system maintenance):")); + /* + * XXX - can't enter single user mode if root password is + * empty. I think this doesn't happen very often :-). But + * it will work with standard getpass() (no NULL on EOF). + * --marekm + */ + if ((NULL == cp) || ('\0' == *cp)) { +#ifdef USE_SYSLOG + SYSLOG (LOG_INFO, "Normal startup\n"); + closelog (); +#endif + (void) puts (""); +#ifdef TELINIT + execl (PATH_TELINIT, "telinit", RUNLEVEL, (char *) 0); +#endif + exit (0); + } else { + STRFCPY (pass, cp); + strzero (cp); + } + if (valid (pass, &pwent)) { /* check encrypted passwords ... */ + break; /* ... encrypted passwords matched */ + } + +#ifdef USE_SYSLOG + SYSLOG (LOG_WARN, "Incorrect root password\n"); +#endif + sleep (2); + (void) puts (_("Login incorrect")); + } + memzero (pass, sizeof pass); + (void) alarm (0); + (void) signal (SIGALRM, SIG_DFL); + environ = newenvp; /* make new environment active */ + + (void) puts (_("Entering System Maintenance Mode")); +#ifdef USE_SYSLOG + SYSLOG (LOG_INFO, "System Maintenance Mode\n"); +#endif + +#ifdef USE_SYSLOG + closelog (); +#endif + /* exec the shell finally. */ + err = shell (pwent.pw_shell, (char *) 0, environ); + + return ((err == ENOENT) ? E_CMD_NOTFOUND : E_CMD_NOEXEC); +} + |