--- loncom/lcpasswd 2000/10/27 19:50:24 1.1 +++ loncom/lcpasswd 2000/10/28 18:25:47 1.5 @@ -1,22 +1,58 @@ #!/usr/bin/perl - -use strict; - +# +# lcpasswd +# # Scott Harrison # October 27, 2000 +use strict; + # This script is a setuid script that should -# be run by user 'www'. +# be run by user 'www'. This script allows +# for synchronous entry of passwords into +# both the /etc/passwd and the /etc/smbpasswd +# files. + +# This script works under the same process control mechanism +# as lcuseradd and lcpasswd, to make sure that only one of these +# processes is running at any one time on the system. # Standard input usage # First line is USERNAME # Second line is CURRENT PASSWORD # Third line is NEW PASSWORD +# Command-line arguments +# Yes, but be very careful here (don't pass shell commands) +# and this is only supported to allow perl-system calls. + +# Usage within code +# Note: NEVER run as system("/home/httpd/perl/lcpasswd NAME OLDPWD NEWPWD") +# +# $exitcode=system("/home/httpd/perl/lcpasswd","NAME","OLDPWD","NEWPWD")/256; +# print "uh-oh" if $exitcode; + +# These are the exit codes. +# ( (0,"ok"), +# (1,"User ID mismatch. This program must be run as user 'www'), +# (2,"Error. This program does not accept command-line arguments."), +# (3,"Error. Three lines need to be entered into standard input.\n"), +# (4,"Error. Too many other simultaneous password change requests being made.\n"), +# (5,"Error. User $username does not exist.\n"), +# (6,"Error. Invalid entry of current password.\n"), +# (7,"Error. Root was not successfully enabled.\n") ) + # Security -$ENV{'PATH'}=""; # Nullify path information. +$ENV{'PATH'}="/bin:/usr/bin"; # Nullify path information except for what smbpasswd needs $ENV{'BASH_ENV'}=""; # Nullify shell environment information. +# Do not print error messages if there are command-line arguments +my $noprint=0; +if (@ARGV) { + $noprint=1; +} + +# Read in /etc/passwd, and make sure this process is running from user=www open (IN, "; close IN; @@ -27,28 +63,39 @@ for my $l (@lines) { if ($F[0] eq 'www') {$wwwid=$F[2];} } if ($wwwid!=$<) { - print("User ID mismatch. This program must be run as user 'www'\n"); - exit 0; -} -if (@ARGV) { - print("Error. This program does not accept command-line arguments.\n"); - exit 0; -} - -# Gather input from standard input. Should only be 3 lines. -my @input=<>; -if (@input!=3) { - print("Error. Three lines need to be entered into standard input.\n"); - exit 0; + print("User ID mismatch. This program must be run as user 'www'\n") unless $noprint; + unlink("/tmp/lock_lcpasswd"); + exit 1; } +&disable_root_capability; # Handle case of another lcpasswd process unless (&try_to_lock("/tmp/lock_lcpasswd")) { - print "Error. Too many other simultaneous password change requests being made.\n"; - exit 0; + print "Error. Too many other simultaneous password change requests being made.\n" unless $noprint; + exit 4; +} + +# Gather input. Should only be 3 values. +my @input; +if (@ARGV==3) { + @input=@ARGV; +} +elsif (@ARGV) { + print("Error. This program needs 3 command-line arguments (username, old password, new password).\n") unless $noprint; + unlink("/tmp/lock_lcpasswd"); + exit 2; +} +else { + @input=<>; + if (@input!=3) { + print("Error. Three lines need to be entered into standard input.\n") unless $noprint; + unlink("/tmp/lock_lcpasswd"); + exit 3; + } + map {chop} @input; } -my ($username,$oldpwd,$newpwd)=map {chop; $_} @input; +my ($username,$oldpwd,$newpwd)=@input; # Grab the line corresponding to username my ($userid,$useroldcryptpwd); @@ -60,54 +107,79 @@ for my $l (@lines) { # Verify existence of user if (!defined($userid)) { - print "Error. User $username does not exist.\n"; - exit 0; + print "Error. User $username does not exist.\n" unless $noprint; + unlink("/tmp/lock_lcpasswd"); + exit 5; } # Verify password entry if (crypt($oldpwd,$useroldcryptpwd) ne $useroldcryptpwd) { - print "Error. Invalid entry of current password.\n"; - exit 0; + print "Error. Invalid entry of current password.\n" unless $noprint; + unlink("/tmp/lock_lcpasswd"); + exit 6; } -# Construct new password entry -my $newcryptpwd=crypt($newpwd,$newpwd); +# Construct new password entry (random salt) +my $newcryptpwd=crypt($newpwd,(join '', ('.', '/', 0..9, 'A'..'Z', 'a'..'z')[rand 64, rand 64])); $U[1]=$newcryptpwd; my $userline=join(":",@U); -print $newcryptpwd; -print $userline; -#my $rootid=&enable_root_capability; -#if ($rootid!=0) { -# print "Error. Root was not successfully enabled.\n"; -# exit 0; -#} -# open SAMBAPASSWORDFILE, ">/etc/smbpasswd"; - ($<,$>)=($>,$<); - ($(,$))=($),$(); -open PASSWORDFILE, "/tmp/passwd2" or die("Cannot open /etc/passwd!"); +my $rootid=&enable_root_capability; +if ($rootid!=0) { + print "Error. Root was not successfully enabled.\n" unless $noprint; + unlink("/tmp/lock_lcpasswd"); + exit 7; +} +open PASSWORDFILE, ">/etc/passwd" or die("Cannot open /etc/passwd!"); for my $l (@lines) { @F=split(/\:/,$l); if ($F[0] eq $username) {print PASSWORDFILE "$userline\n";} else {print PASSWORDFILE "$l\n";} } close PASSWORDFILE; -# close SAMBAPASSWORDFILE; +$username=~/^(\w+)$/; +my $safeusername=$1; +($>,$<)=(0,0); # fool smbpasswd here to think this is not a setuid environment +unless (-e "/etc/smbpasswd") { + open (OUT,">/etc/smbpasswd"); close OUT; +} +my $smbexist=0; +open (IN, "; +close IN; +for my $l (@lines) { + chop $l; + my @F=split(/\:/,$l); + if ($F[0] eq $username) {$smbexist=1;} +} +unless ($smbexist) { + open(OUT,">>/etc/smbpasswd"); + print OUT join(":",($safeusername,$userid,'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX','','/home/'.$safeusername,'/bin/bash')) . "\n"; + close OUT; +} +open(OUT,"|/usr/bin/smbpasswd -s $safeusername>/dev/null"); +print OUT $newpwd; print OUT "\n"; +print OUT $newpwd; print OUT "\n"; +close OUT; +$<=$wwwid; # unfool the program &disable_root_capability; unlink("/tmp/lock_lcpasswd"); +exit 0; +# ----------------------------------------------------------- have setuid script run as root sub enable_root_capability { - if ($wwwid==$<) { + if ($wwwid==$>) { ($<,$>)=($>,$<); ($(,$))=($),$(); } else { # root capability is already enabled } - return $<; + return $>; } +# ----------------------------------------------------------- have setuid script run as www sub disable_root_capability { - if ($wwwid==$>) { + if ($wwwid==$<) { ($<,$>)=($>,$<); ($(,$))=($),$(); } @@ -116,10 +188,20 @@ sub disable_root_capability { } } +# ----------------------------------- make sure that another lcpasswd process isn't running sub try_to_lock { my ($lockfile)=@_; my $currentpid; my $lastpid; + # Do not manipulate lock file as root + if ($>==0) { + return 0; + } + # Try to generate lock file. + # Wait 3 seconds. If same process id is in + # lock file, then assume lock file is stale, and + # go ahead. If process id's fluctuate, try + # for a maximum of 10 times. for (0..10) { if (-e $lockfile) { open(LOCK,"<$lockfile");