/* $OpenBSD: yp_passwd.c,v 1.31 2008/11/06 05:35:56 djm Exp $ */ /* * Copyright (c) 1988 The Regents of the University of California. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #ifndef lint /*static const char sccsid[] = "from: @(#)yp_passwd.c 1.0 2/2/93";*/ static const char rcsid[] = "$OpenBSD: yp_passwd.c,v 1.31 2008/11/06 05:35:56 djm Exp $"; #endif /* not lint */ #ifdef YP #include #include #include #include #include #include #include #include #include #include #include #include #include #include #define passwd yp_passwd_rec #include #undef passwd #ifndef _PASSWORD_LEN #define _PASSWORD_LEN PASS_MAX #endif extern int pwd_gensalt(char *, int, login_cap_t *, char); extern int pwd_check(login_cap_t *, char *); extern int pwd_gettries(login_cap_t *); extern void kbintr(int); int yp_passwd(char *); char *ypgetnewpasswd(struct passwd *, login_cap_t *, char **); struct passwd *ypgetpwnam(char *, int); struct passwd *interpret(struct passwd *, char *, int); char *domain; static int pw_error(char *name, int error, int eval) { if (error) { if (name) warn("%s", name); else warn(NULL); } warnx("YP passwd database: unchanged."); exit(eval); } int yp_passwd(char *username) { struct yppasswd yppwd; int r, rpcport, status, secure=0; struct passwd *pw; struct timeval tv; login_cap_t *lc; CLIENT *client; char *master; uid_t uid; /* * Get local domain */ if ((r = yp_get_default_domain(&domain)) != 0) { warnx("can't get local YP domain. Reason: %s", yperr_string(r)); return (1); } /* * Find the host for the passwd map; it should be running * the daemon. */ if ((r = yp_master(domain, "master.passwd.byname", &master)) == 0) { secure=1; } else if ((r = yp_master(domain, "passwd.byname", &master)) != 0) { warnx("can't find the master YP server. Reason: %s", yperr_string(r)); return (1); } /* * Ask the portmapper for the port of the daemon. */ if ((rpcport = getrpcport(master, YPPASSWDPROG, YPPASSWDPROC_UPDATE, IPPROTO_UDP)) == 0) { warnx("master YP server not running yppasswd daemon."); warnx("Can't change password."); return (1); } /* * Be sure the port is privileged */ if (rpcport >= IPPORT_RESERVED) { warnx("yppasswd daemon is on an invalid port."); return (1); } /* Get user's login identity */ if (!(pw = ypgetpwnam(username, secure))) { warnx("unknown user %s.", username); return (1); } if ((lc = login_getclass(pw->pw_class)) == NULL) { warnx("unable to get login class for user %s.", username); return (1); } uid = getuid(); if (uid && uid != pw->pw_uid) { warnx("you may only change your own password: %s", strerror(EACCES)); return (1); } /* prompt for new password */ yppwd.newpw.pw_passwd = ypgetnewpasswd(pw, lc, &yppwd.oldpass); /* tell rpc.yppasswdd */ yppwd.newpw.pw_name = pw->pw_name; yppwd.newpw.pw_uid = pw->pw_uid; yppwd.newpw.pw_gid = pw->pw_gid; yppwd.newpw.pw_gecos = pw->pw_gecos; yppwd.newpw.pw_dir = pw->pw_dir; yppwd.newpw.pw_shell = pw->pw_shell; client = clnt_create(master, YPPASSWDPROG, YPPASSWDVERS, "udp"); if (client==NULL) { warnx("cannot contact yppasswdd on %s: Reason: %s", master, yperr_string(YPERR_YPBIND)); free(yppwd.newpw.pw_passwd); return (YPERR_YPBIND); } client->cl_auth = authunix_create_default(); tv.tv_sec = 2; tv.tv_usec = 0; r = clnt_call(client, YPPASSWDPROC_UPDATE, xdr_yppasswd, &yppwd, xdr_int, &status, tv); if (r) { printf("rpc to yppasswdd failed.\n"); free(yppwd.newpw.pw_passwd); return (1); } else if (status) { printf("Couldn't change YP password.\n"); free(yppwd.newpw.pw_passwd); return (1); } else { printf("The YP password has been changed on %s, " "the master YP passwd server.\n", master); free(yppwd.newpw.pw_passwd); return (0); } } char * ypgetnewpasswd(struct passwd *pw, login_cap_t *lc, char **old_pass) { static char buf[_PASSWORD_LEN+1]; char salt[_PASSWORD_LEN]; sig_t saveint, savequit; int tries, pwd_tries; char *p; saveint = signal(SIGINT, kbintr); savequit = signal(SIGQUIT, kbintr); printf("Changing YP password for %s.\n", pw->pw_name); if (old_pass) { *old_pass = NULL; if (pw->pw_passwd[0]) { p = getpass("Old password:"); if (p == NULL || strcmp(crypt(p, pw->pw_passwd), pw->pw_passwd)) { errno = EACCES; pw_error(NULL, 1, 1); } } else p = ""; *old_pass = strdup(p); if (*old_pass == NULL) pw_error(NULL, 1, 1); } pwd_tries = pwd_gettries(lc); for (buf[0] = '\0', tries = 0;;) { p = getpass("New password:"); if (p == NULL || *p == '\0') pw_error(NULL, 0, p == NULL ? 1 : 0); if (strcmp(p, "s/key") == 0) { printf("That password collides with a system feature. " "Choose another.\n"); continue; } if ((tries++ < pwd_tries || pwd_tries == 0) && pwd_check(lc, p) == 0) continue; strlcpy(buf, p, sizeof buf); p = getpass("Retype new password:"); if (p != NULL && strcmp(buf, p) == 0) break; (void)printf("Mismatch; try again, EOF to quit.\n"); } if (!pwd_gensalt(salt, _PASSWORD_LEN, lc, 'y')) { (void)printf("Couldn't generate salt.\n"); pw_error(NULL, 0, 0); } p = strdup(crypt(buf, salt)); if (p == NULL) pw_error(NULL, 1, 1); (void)signal(SIGINT, saveint); (void)signal(SIGQUIT, savequit); return (p); } static char * pwskip(char *p) { while (*p && *p != ':' && *p != '\n') ++p; if (*p) *p++ = 0; return (p); } struct passwd * interpret(struct passwd *pwent, char *line, int secure) { char *p = line; pwent->pw_passwd = "*"; pwent->pw_uid = 0; pwent->pw_gid = 0; pwent->pw_gecos = ""; pwent->pw_dir = ""; pwent->pw_shell = ""; pwent->pw_change = 0; pwent->pw_expire = 0; pwent->pw_class = ""; /* line without colon separators is no good, so ignore it */ if (!strchr(p, ':')) return (NULL); pwent->pw_name = p; p = pwskip(p); pwent->pw_passwd = p; p = pwskip(p); pwent->pw_uid = (uid_t)strtoul(p, NULL, 10); p = pwskip(p); pwent->pw_gid = (gid_t)strtoul(p, NULL, 10); p = pwskip(p); if ( secure == 1 ) { pwent->pw_class = p; p = pwskip(p); pwent->pw_change = (time_t)strtoul(p, NULL, 10); p = pwskip(p); pwent->pw_expire = (time_t)strtoul(p, NULL, 10); p = pwskip(p); } pwent->pw_gecos = p; p = pwskip(p); pwent->pw_dir = p; p = pwskip(p); pwent->pw_shell = p; while (*p && *p != '\n') p++; *p = '\0'; return (pwent); } static char *__yplin; struct passwd * ypgetpwnam(char *nam, int secure) { static struct passwd pwent; int reason, vallen; char *val; reason = yp_match(domain, secure ? "master.passwd.byname" : "passwd.byname", nam, strlen(nam), &val, &vallen); switch (reason) { case 0: break; default: return (NULL); } val[vallen] = '\0'; if (__yplin) free(__yplin); __yplin = (char *)malloc(vallen + 1); if (__yplin == NULL) pw_error(NULL, 1, 1); strlcpy(__yplin, val, vallen + 1); free(val); return (interpret(&pwent, __yplin, secure)); } #endif /* YP */