1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-27 03:21:53 +03:00
samba-mirror/source3/lib/util_sec.c
Volker Lendecke 4f62277d89 After a phonecall with jra finally commit this.
This changes our behaviour when the setresuid call is available. We now not
only change the effective uid but also the real uid when becoming
unprivileged. This is mainly for improved AFS compatibility, as AFS selects
the token to send to the server based on the real uid of the process.

I tested this with a W2k server with two non-root 'runas' sessions. They come
in via a single smbd as two different users using two session setups. Samba on
Linux can still switch between the two uids, proved by two different files
created via those sessions.

Volker
(This used to be commit 556c62f935)
2003-10-23 16:49:46 +00:00

460 lines
11 KiB
C

/*
Unix SMB/CIFS implementation.
Copyright (C) Jeremy Allison 1998.
rewritten for version 2.0.6 by Tridge
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#ifndef AUTOCONF_TEST
#include "includes.h"
#else
/* we are running this code in autoconf test mode to see which type of setuid
function works */
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#include <stdlib.h>
#include <stdio.h>
#include <sys/types.h>
#include <errno.h>
#ifdef HAVE_SYS_PRIV_H
#include <sys/priv.h>
#endif
#ifdef HAVE_SYS_ID_H
#include <sys/id.h>
#endif
#define DEBUG(x, y) printf y
#define smb_panic(x) exit(1)
#define BOOL int
#endif
/* are we running as non-root? This is used by the regresison test code,
and potentially also for sites that want non-root smbd */
static uid_t initial_uid;
static gid_t initial_gid;
/****************************************************************************
remember what uid we got started as - this allows us to run correctly
as non-root while catching trapdoor systems
****************************************************************************/
void sec_init(void)
{
initial_uid = geteuid();
initial_gid = getegid();
}
/****************************************************************************
some code (eg. winbindd) needs to know what uid we started as
****************************************************************************/
uid_t sec_initial_uid(void)
{
return initial_uid;
}
/****************************************************************************
some code (eg. winbindd, profiling shm) needs to know what gid we started as
****************************************************************************/
gid_t sec_initial_gid(void)
{
return initial_gid;
}
/****************************************************************************
are we running in non-root mode?
****************************************************************************/
BOOL non_root_mode(void)
{
return (initial_uid != (uid_t)0);
}
/****************************************************************************
abort if we haven't set the uid correctly
****************************************************************************/
static void assert_uid(uid_t ruid, uid_t euid)
{
if ((euid != (uid_t)-1 && geteuid() != euid) ||
(ruid != (uid_t)-1 && getuid() != ruid)) {
if (!non_root_mode()) {
DEBUG(0,("Failed to set uid privileges to (%d,%d) now set to (%d,%d)\n",
(int)ruid, (int)euid,
(int)getuid(), (int)geteuid()));
smb_panic("failed to set uid\n");
exit(1);
}
}
}
/****************************************************************************
abort if we haven't set the gid correctly
****************************************************************************/
static void assert_gid(gid_t rgid, gid_t egid)
{
if ((egid != (gid_t)-1 && getegid() != egid) ||
(rgid != (gid_t)-1 && getgid() != rgid)) {
if (!non_root_mode()) {
DEBUG(0,("Failed to set gid privileges to (%d,%d) now set to (%d,%d) uid=(%d,%d)\n",
(int)rgid, (int)egid,
(int)getgid(), (int)getegid(),
(int)getuid(), (int)geteuid()));
smb_panic("failed to set gid\n");
exit(1);
}
}
}
/****************************************************************************
Gain root privilege before doing something.
We want to end up with ruid==euid==0
****************************************************************************/
void gain_root_privilege(void)
{
#if USE_SETRESUID
setresuid(0,0,0);
#endif
#if USE_SETEUID
seteuid(0);
#endif
#if USE_SETREUID
setreuid(0, 0);
#endif
#if USE_SETUIDX
setuidx(ID_EFFECTIVE, 0);
setuidx(ID_REAL, 0);
#endif
/* this is needed on some systems */
setuid(0);
assert_uid(0, 0);
}
/****************************************************************************
Ensure our real and effective groups are zero.
we want to end up with rgid==egid==0
****************************************************************************/
void gain_root_group_privilege(void)
{
#if USE_SETRESUID
setresgid(0,0,0);
#endif
#if USE_SETREUID
setregid(0,0);
#endif
#if USE_SETEUID
setegid(0);
#endif
#if USE_SETUIDX
setgidx(ID_EFFECTIVE, 0);
setgidx(ID_REAL, 0);
#endif
setgid(0);
assert_gid(0, 0);
}
/****************************************************************************
Set *only* the effective uid.
we want to end up with ruid==0 and euid==uid
****************************************************************************/
void set_effective_uid(uid_t uid)
{
#if USE_SETRESUID
/* Set the effective as well as the real uid. */
setresuid(uid,uid,-1);
#endif
#if USE_SETREUID
setreuid(-1,uid);
#endif
#if USE_SETEUID
seteuid(uid);
#endif
#if USE_SETUIDX
setuidx(ID_EFFECTIVE, uid);
#endif
assert_uid(-1, uid);
}
/****************************************************************************
Set *only* the effective gid.
we want to end up with rgid==0 and egid==gid
****************************************************************************/
void set_effective_gid(gid_t gid)
{
#if USE_SETRESUID
setresgid(-1,gid,-1);
#endif
#if USE_SETREUID
setregid(-1,gid);
#endif
#if USE_SETEUID
setegid(gid);
#endif
#if USE_SETUIDX
setgidx(ID_EFFECTIVE, gid);
#endif
assert_gid(-1, gid);
}
static uid_t saved_euid, saved_ruid;
static gid_t saved_egid, saved_rgid;
/****************************************************************************
save the real and effective uid for later restoration. Used by the quotas
code
****************************************************************************/
void save_re_uid(void)
{
saved_ruid = getuid();
saved_euid = geteuid();
}
/****************************************************************************
and restore them!
****************************************************************************/
void restore_re_uid(void)
{
set_effective_uid(0);
#if USE_SETRESUID
setresuid(saved_ruid, saved_euid, -1);
#elif USE_SETREUID
setreuid(saved_ruid, -1);
setreuid(-1,saved_euid);
#elif USE_SETUIDX
setuidx(ID_REAL, saved_ruid);
setuidx(ID_EFFECTIVE, saved_euid);
#else
set_effective_uid(saved_euid);
if (getuid() != saved_ruid)
setuid(saved_ruid);
set_effective_uid(saved_euid);
#endif
assert_uid(saved_ruid, saved_euid);
}
/****************************************************************************
save the real and effective gid for later restoration. Used by the
getgroups code
****************************************************************************/
void save_re_gid(void)
{
saved_rgid = getgid();
saved_egid = getegid();
}
/****************************************************************************
and restore them!
****************************************************************************/
void restore_re_gid(void)
{
#if USE_SETRESUID
setresgid(saved_rgid, saved_egid, -1);
#elif USE_SETREUID
setregid(saved_rgid, -1);
setregid(-1,saved_egid);
#elif USE_SETUIDX
setgidx(ID_REAL, saved_rgid);
setgidx(ID_EFFECTIVE, saved_egid);
#else
set_effective_gid(saved_egid);
if (getgid() != saved_rgid)
setgid(saved_rgid);
set_effective_gid(saved_egid);
#endif
assert_gid(saved_rgid, saved_egid);
}
/****************************************************************************
set the real AND effective uid to the current effective uid in a way that
allows root to be regained.
This is only possible on some platforms.
****************************************************************************/
int set_re_uid(void)
{
uid_t uid = geteuid();
#if USE_SETRESUID
setresuid(geteuid(), -1, -1);
#endif
#if USE_SETREUID
setreuid(0, 0);
setreuid(uid, -1);
setreuid(-1, uid);
#endif
#if USE_SETEUID
/* can't be done */
return -1;
#endif
#if USE_SETUIDX
/* can't be done */
return -1;
#endif
assert_uid(uid, uid);
return 0;
}
/****************************************************************************
Become the specified uid and gid - permanently !
there should be no way back if possible
****************************************************************************/
void become_user_permanently(uid_t uid, gid_t gid)
{
/*
* First - gain root privilege. We do this to ensure
* we can lose it again.
*/
gain_root_privilege();
gain_root_group_privilege();
#if USE_SETRESUID
setresgid(gid,gid,gid);
setgid(gid);
setresuid(uid,uid,uid);
setuid(uid);
#endif
#if USE_SETREUID
setregid(gid,gid);
setgid(gid);
setreuid(uid,uid);
setuid(uid);
#endif
#if USE_SETEUID
setegid(gid);
setgid(gid);
setuid(uid);
seteuid(uid);
setuid(uid);
#endif
#if USE_SETUIDX
setgidx(ID_REAL, gid);
setgidx(ID_EFFECTIVE, gid);
setgid(gid);
setuidx(ID_REAL, uid);
setuidx(ID_EFFECTIVE, uid);
setuid(uid);
#endif
assert_uid(uid, uid);
assert_gid(gid, gid);
}
#ifdef AUTOCONF_TEST
/****************************************************************************
this function just checks that we don't get ENOSYS back
****************************************************************************/
static int have_syscall(void)
{
errno = 0;
#if USE_SETRESUID
setresuid(-1,-1,-1);
#endif
#if USE_SETREUID
setreuid(-1,-1);
#endif
#if USE_SETEUID
seteuid(-1);
#endif
#if USE_SETUIDX
setuidx(ID_EFFECTIVE, -1);
#endif
if (errno == ENOSYS) return -1;
return 0;
}
main()
{
if (getuid() != 0) {
#if (defined(AIX) && defined(USE_SETREUID))
/* setreuid is badly broken on AIX 4.1, we avoid it completely */
fprintf(stderr,"avoiding possibly broken setreuid\n");
exit(1);
#endif
/* if not running as root then at least check to see if we get ENOSYS - this
handles Linux 2.0.x with glibc 2.1 */
fprintf(stderr,"not running as root: checking for ENOSYS\n");
exit(have_syscall());
}
gain_root_privilege();
gain_root_group_privilege();
set_effective_gid(1);
set_effective_uid(1);
save_re_uid();
restore_re_uid();
gain_root_privilege();
gain_root_group_privilege();
become_user_permanently(1, 1);
setuid(0);
if (getuid() == 0) {
fprintf(stderr,"uid not set permanently\n");
exit(1);
}
printf("OK\n");
exit(0);
}
#endif
/****************************************************************************
Check if we are setuid root. Used in libsmb and smbpasswd paranoia checks.
****************************************************************************/
BOOL is_setuid_root(void)
{
return (geteuid() == (uid_t)0) && (getuid() != (uid_t)0);
}