1
0
Fork 0
forked from soccera/rdo
rdo/rdo.c

146 lines
3.5 KiB
C
Raw Normal View History

2021-07-13 21:33:12 +02:00
#include <pwd.h>
#include <grp.h>
#include <err.h>
2021-07-13 21:33:12 +02:00
#include <shadow.h>
#include <crypt.h>
#include <unistd.h>
#include <stdio.h>
#include <stdlib.h>
2021-07-13 21:33:12 +02:00
#include <string.h>
#include "readpassphrase.h"
#include "sessions.h"
2021-07-13 21:33:12 +02:00
2022-07-28 17:21:52 +02:00
#define VERSION "1.4.2"
2021-07-13 23:31:23 +02:00
void getconf(FILE* fp, const char* entry, char* result, size_t len_result) {
char* line = NULL;
size_t len = 0;
fseek(fp, 0, SEEK_SET);
while (getline(&line, &len, fp) != -1) {
if (strncmp(entry, line, strlen(entry)) == 0) {
strtok(line, "=");
char* token = strtok(NULL, "=");
if (token) {
strncpy(result, token, len_result);
result[strcspn(result, "\n")] = 0;
free(line);
2021-07-13 23:31:23 +02:00
return;
}
}
}
2021-07-13 23:31:23 +02:00
errx(1, "Could not get '%s' entry in config", entry);
}
void runprog(char** program_argv) {
2021-07-16 00:38:50 +02:00
if (setuid(0) < 0)
err(1, "Could not setuid");
2021-07-16 00:38:50 +02:00
if (setgid(0) < 0)
err(1, "Could not setgid");
putenv("HOME=/root");
// NOTE: this does not return when no error occurred.
execvp(program_argv[0], program_argv);
2022-07-28 17:21:52 +02:00
err(1, "%s", program_argv[0]);
2021-07-13 21:33:12 +02:00
}
int main(int argc, char** argv) {
char groupname[64], wrong_pw_sleep[64], session_ttl[64], password[128];
unsigned int sleep_us, tries, ts_ttl;
int read_pw_from_stdin = 0;
if (argc > 1)
read_pw_from_stdin = strcmp(argv[1], "-") == 0;
if (argc == 1 || (read_pw_from_stdin && argc == 2)) {
printf("RootDO version: %s\n\n", VERSION);
printf("Usage: %s [command]\n", argv[0]);
return 0;
}
2021-07-13 21:33:12 +02:00
if (geteuid() != 0)
errx(1, "The rdo binary needs to be installed as SUID.");
2021-07-13 21:33:12 +02:00
int ruid = getuid();
if (ruid == 0)
runprog(&argv[read_pw_from_stdin+1]);
2021-07-15 12:46:27 +02:00
2021-07-15 14:59:24 +02:00
FILE* fp = fopen("/etc/rdo.conf", "r");
if (!fp)
err(1, "Could not open /etc/rdo.conf");
getconf(fp, "group", groupname, sizeof(groupname));
getconf(fp, "wrong_pw_sleep", wrong_pw_sleep, sizeof(wrong_pw_sleep));
getconf(fp, "session_ttl", session_ttl, sizeof(session_ttl));
sleep_us = atoi(wrong_pw_sleep) * 1000;
2021-07-16 00:15:04 +02:00
ts_ttl = atoi(session_ttl) * 60;
2021-07-13 21:33:12 +02:00
2021-07-15 14:59:24 +02:00
fclose(fp);
if (getsession(getppid(), ts_ttl, ruid) == 0 && !read_pw_from_stdin)
runprog(&argv[1]);
struct passwd* pw = getpwuid(ruid);
if (!pw) {
if (errno == 0)
errx(1, "No user with UID %d", ruid);
else
err(1, "Could not get user info");
}
2021-07-13 21:33:12 +02:00
struct group* current_group_entry = getgrent();
while (current_group_entry) {
if (strcmp(current_group_entry->gr_name, groupname) == 0)
break;
current_group_entry = getgrent();
}
if (!current_group_entry)
errx(1, "The group '%s' does not exist.", groupname);
char* current_member = current_group_entry->gr_mem[0];
for (int i = 1; current_member; i++) {
if (strcmp(current_member, pw->pw_name) == 0)
break;
current_member = current_group_entry->gr_mem[i];
}
if (!current_member)
errx(1, "You are not allowed to execute rdo.");
2021-07-13 21:33:12 +02:00
struct spwd* shadowEntry = getspnam(pw->pw_name);
2021-07-13 21:33:12 +02:00
if (!shadowEntry || !shadowEntry->sp_pwdp)
err(1, "Could not get shadow entry");
2021-07-13 21:33:12 +02:00
tries = 0;
2021-07-13 21:33:12 +02:00
while (tries < 3) {
if (!readpassphrase("(rdo) Password: ", password, sizeof(password), read_pw_from_stdin))
err(1, "Could not get passphrase");
char* hashed_pw = crypt(password, shadowEntry->sp_pwdp);
memset(password, 0, sizeof(password));
if (!hashed_pw)
errx(1, "Could not hash password, does your user have a password?");
if (strcmp(shadowEntry->sp_pwdp, hashed_pw) == 0) {
if (!read_pw_from_stdin)
setsession(getppid(), ts_ttl, ruid);
runprog(&argv[read_pw_from_stdin+1]);
}
2021-07-15 12:46:27 +02:00
usleep(sleep_us);
2021-07-13 21:33:12 +02:00
fprintf(stderr, "Wrong password.\n");
tries++;
2021-07-13 21:33:12 +02:00
}
errx(1, "Too many wrong password attempts.");
return 1;
2021-07-13 21:33:12 +02:00
}