From 45b8d8b819b1dd55727f002d76d07f6bdf06f758 Mon Sep 17 00:00:00 2001 From: git Date: Thu, 12 Mar 2009 03:04:58 +0100 Subject: [PATCH] Imported version 1.0 --- COPYING | 340 ++++++++++++++++++++++++++++++++++++++++++++++++++++ Makefile | 20 ++++ README | 30 +++++ TODO | 7 ++ VERSION | 1 + cmdline.h | 198 ++++++++++++++++++++++++++++++ su-wrapper.c | 365 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ su-wrapper.conf | 42 +++++++ 8 files changed, 1003 insertions(+) create mode 100644 COPYING create mode 100644 Makefile create mode 100644 README create mode 100644 TODO create mode 100644 VERSION create mode 100644 cmdline.h create mode 100644 su-wrapper.c create mode 100644 su-wrapper.conf diff --git a/COPYING b/COPYING new file mode 100644 index 0000000..eeb586b --- /dev/null +++ b/COPYING @@ -0,0 +1,340 @@ + GNU GENERAL PUBLIC LICENSE + Version 2, June 1991 + + Copyright (C) 1989, 1991 Free Software Foundation, Inc. + 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The licenses for most software are designed to take away your +freedom to share and change it. By contrast, the GNU General Public +License is intended to guarantee your freedom to share and change free +software--to make sure the software is free for all its users. This +General Public License applies to most of the Free Software +Foundation's software and to any other program whose authors commit to +using it. (Some other Free Software Foundation software is covered by +the GNU Library General Public License instead.) You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +this service if you wish), that you receive source code or can get it +if you want it, that you can change the software or use pieces of it +in new free programs; and that you know you can do these things. + + To protect your rights, we need to make restrictions that forbid +anyone to deny you these rights or to ask you to surrender the rights. +These restrictions translate to certain responsibilities for you if you +distribute copies of the software, or if you modify it. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must give the recipients all the rights that +you have. You must make sure that they, too, receive or can get the +source code. And you must show them these terms so they know their +rights. + + We protect your rights with two steps: (1) copyright the software, and +(2) offer you this license which gives you legal permission to copy, +distribute and/or modify the software. + + Also, for each author's protection and ours, we want to make certain +that everyone understands that there is no warranty for this free +software. If the software is modified by someone else and passed on, we +want its recipients to know that what they have is not the original, so +that any problems introduced by others will not reflect on the original +authors' reputations. + + Finally, any free program is threatened constantly by software +patents. We wish to avoid the danger that redistributors of a free +program will individually obtain patent licenses, in effect making the +program proprietary. To prevent this, we have made it clear that any +patent must be licensed for everyone's free use or not licensed at all. + + The precise terms and conditions for copying, distribution and +modification follow. + + GNU GENERAL PUBLIC LICENSE + TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION + + 0. This License applies to any program or other work which contains +a notice placed by the copyright holder saying it may be distributed +under the terms of this General Public License. The "Program", below, +refers to any such program or work, and a "work based on the Program" +means either the Program or any derivative work under copyright law: +that is to say, a work containing the Program or a portion of it, +either verbatim or with modifications and/or translated into another +language. (Hereinafter, translation is included without limitation in +the term "modification".) Each licensee is addressed as "you". + +Activities other than copying, distribution and modification are not +covered by this License; they are outside its scope. The act of +running the Program is not restricted, and the output from the Program +is covered only if its contents constitute a work based on the +Program (independent of having been made by running the Program). +Whether that is true depends on what the Program does. + + 1. You may copy and distribute verbatim copies of the Program's +source code as you receive it, in any medium, provided that you +conspicuously and appropriately publish on each copy an appropriate +copyright notice and disclaimer of warranty; keep intact all the +notices that refer to this License and to the absence of any warranty; +and give any other recipients of the Program a copy of this License +along with the Program. + +You may charge a fee for the physical act of transferring a copy, and +you may at your option offer warranty protection in exchange for a fee. + + 2. You may modify your copy or copies of the Program or any portion +of it, thus forming a work based on the Program, and copy and +distribute such modifications or work under the terms of Section 1 +above, provided that you also meet all of these conditions: + + a) You must cause the modified files to carry prominent notices + stating that you changed the files and the date of any change. + + b) You must cause any work that you distribute or publish, that in + whole or in part contains or is derived from the Program or any + part thereof, to be licensed as a whole at no charge to all third + parties under the terms of this License. + + c) If the modified program normally reads commands interactively + when run, you must cause it, when started running for such + interactive use in the most ordinary way, to print or display an + announcement including an appropriate copyright notice and a + notice that there is no warranty (or else, saying that you provide + a warranty) and that users may redistribute the program under + these conditions, and telling the user how to view a copy of this + License. (Exception: if the Program itself is interactive but + does not normally print such an announcement, your work based on + the Program is not required to print an announcement.) + +These requirements apply to the modified work as a whole. If +identifiable sections of that work are not derived from the Program, +and can be reasonably considered independent and separate works in +themselves, then this License, and its terms, do not apply to those +sections when you distribute them as separate works. But when you +distribute the same sections as part of a whole which is a work based +on the Program, the distribution of the whole must be on the terms of +this License, whose permissions for other licensees extend to the +entire whole, and thus to each and every part regardless of who wrote it. + +Thus, it is not the intent of this section to claim rights or contest +your rights to work written entirely by you; rather, the intent is to +exercise the right to control the distribution of derivative or +collective works based on the Program. + +In addition, mere aggregation of another work not based on the Program +with the Program (or with a work based on the Program) on a volume of +a storage or distribution medium does not bring the other work under +the scope of this License. + + 3. You may copy and distribute the Program (or a work based on it, +under Section 2) in object code or executable form under the terms of +Sections 1 and 2 above provided that you also do one of the following: + + a) Accompany it with the complete corresponding machine-readable + source code, which must be distributed under the terms of Sections + 1 and 2 above on a medium customarily used for software interchange; or, + + b) Accompany it with a written offer, valid for at least three + years, to give any third party, for a charge no more than your + cost of physically performing source distribution, a complete + machine-readable copy of the corresponding source code, to be + distributed under the terms of Sections 1 and 2 above on a medium + customarily used for software interchange; or, + + c) Accompany it with the information you received as to the offer + to distribute corresponding source code. (This alternative is + allowed only for noncommercial distribution and only if you + received the program in object code or executable form with such + an offer, in accord with Subsection b above.) + +The source code for a work means the preferred form of the work for +making modifications to it. For an executable work, complete source +code means all the source code for all modules it contains, plus any +associated interface definition files, plus the scripts used to +control compilation and installation of the executable. However, as a +special exception, the source code distributed need not include +anything that is normally distributed (in either source or binary +form) with the major components (compiler, kernel, and so on) of the +operating system on which the executable runs, unless that component +itself accompanies the executable. + +If distribution of executable or object code is made by offering +access to copy from a designated place, then offering equivalent +access to copy the source code from the same place counts as +distribution of the source code, even though third parties are not +compelled to copy the source along with the object code. + + 4. You may not copy, modify, sublicense, or distribute the Program +except as expressly provided under this License. Any attempt +otherwise to copy, modify, sublicense or distribute the Program is +void, and will automatically terminate your rights under this License. +However, parties who have received copies, or rights, from you under +this License will not have their licenses terminated so long as such +parties remain in full compliance. + + 5. You are not required to accept this License, since you have not +signed it. However, nothing else grants you permission to modify or +distribute the Program or its derivative works. These actions are +prohibited by law if you do not accept this License. Therefore, by +modifying or distributing the Program (or any work based on the +Program), you indicate your acceptance of this License to do so, and +all its terms and conditions for copying, distributing or modifying +the Program or works based on it. + + 6. Each time you redistribute the Program (or any work based on the +Program), the recipient automatically receives a license from the +original licensor to copy, distribute or modify the Program subject to +these terms and conditions. You may not impose any further +restrictions on the recipients' exercise of the rights granted herein. +You are not responsible for enforcing compliance by third parties to +this License. + + 7. If, as a consequence of a court judgment or allegation of patent +infringement or for any other reason (not limited to patent issues), +conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot +distribute so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you +may not distribute the Program at all. For example, if a patent +license would not permit royalty-free redistribution of the Program by +all those who receive copies directly or indirectly through you, then +the only way you could satisfy both it and this License would be to +refrain entirely from distribution of the Program. + +If any portion of this section is held invalid or unenforceable under +any particular circumstance, the balance of the section is intended to +apply and the section as a whole is intended to apply in other +circumstances. + +It is not the purpose of this section to induce you to infringe any +patents or other property right claims or to contest validity of any +such claims; this section has the sole purpose of protecting the +integrity of the free software distribution system, which is +implemented by public license practices. Many people have made +generous contributions to the wide range of software distributed +through that system in reliance on consistent application of that +system; it is up to the author/donor to decide if he or she is willing +to distribute software through any other system and a licensee cannot +impose that choice. + +This section is intended to make thoroughly clear what is believed to +be a consequence of the rest of this License. + + 8. If the distribution and/or use of the Program is restricted in +certain countries either by patents or by copyrighted interfaces, the +original copyright holder who places the Program under this License +may add an explicit geographical distribution limitation excluding +those countries, so that distribution is permitted only in or among +countries not thus excluded. In such case, this License incorporates +the limitation as if written in the body of this License. + + 9. The Free Software Foundation may publish revised and/or new versions +of the General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + +Each version is given a distinguishing version number. If the Program +specifies a version number of this License which applies to it and "any +later version", you have the option of following the terms and conditions +either of that version or of any later version published by the Free +Software Foundation. If the Program does not specify a version number of +this License, you may choose any version ever published by the Free Software +Foundation. + + 10. If you wish to incorporate parts of the Program into other free +programs whose distribution conditions are different, write to the author +to ask for permission. For software which is copyrighted by the Free +Software Foundation, write to the Free Software Foundation; we sometimes +make exceptions for this. Our decision will be guided by the two goals +of preserving the free status of all derivatives of our free software and +of promoting the sharing and reuse of software generally. + + NO WARRANTY + + 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN +OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES +PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED +OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS +TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE +PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, +REPAIR OR CORRECTION. + + 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE +POSSIBILITY OF SUCH DAMAGES. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +convey the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + + Copyright (C) 19yy + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + + +Also add information on how to contact you by electronic and paper mail. + +If the program is interactive, make it output a short notice like this +when it starts in an interactive mode: + + Gnomovision version 69, Copyright (C) 19yy name of author + Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, the commands you use may +be called something other than `show w' and `show c'; they could even be +mouse-clicks or menu items--whatever suits your program. + +You should also get your employer (if you work as a programmer) or your +school, if any, to sign a "copyright disclaimer" for the program, if +necessary. Here is a sample; alter the names: + + Yoyodyne, Inc., hereby disclaims all copyright interest in the program + `Gnomovision' (which makes passes at compilers) written by James Hacker. + + , 1 April 1989 + Ty Coon, President of Vice + +This General Public License does not permit incorporating your program into +proprietary programs. If your program is a subroutine library, you may +consider it more useful to permit linking proprietary applications with the +library. If this is what you want to do, use the GNU Library General +Public License instead of this License. diff --git a/Makefile b/Makefile new file mode 100644 index 0000000..5a709a5 --- /dev/null +++ b/Makefile @@ -0,0 +1,20 @@ + +all: su-wrapper + +su-wrapper: su-wrapper.o + $(CC) su-wrapper.o -o su-wrapper $(LD_FLAGS) + +install: su-wrapper su-wrapper.conf + cp su-wrapper /usr/sbin + chown root.root /usr/sbin/su-wrapper + chmod +s /usr/sbin/su-wrapper + cp su-wrapper.conf /etc + chown root.root /etc/su-wrapper.conf + echo Please edit /etc/su-wrapper.conf + +clean: + rm -f su-wrapper su-wrapper.o + +uninstall: + rm -f /usr/sbin/su-wrapper + mv /etc/su-wrapper.conf /etc/su-wrapper.conf.--- diff --git a/README b/README new file mode 100644 index 0000000..2949e68 --- /dev/null +++ b/README @@ -0,0 +1,30 @@ + +su-wrapper is an little util which lets special users +execute processes under another uid/gid. + +it uses an table ( /etc/su-wrapper.conf ) to decide what +to do in certain situation. therefore it walks through +the table and tries to match the current situation +(the later entries have precedence). + +the config table + + current UID --+ +-- + current GID | | exec UID + argv[0] | ====> | exec GID + argv[1] | | exec cmdline + ... --+ +-- + +for more information please look at the su-wrapper.conf + + +Howto build: + + * make + make install + + * edit /etc/su-wrapper.conf + + + + \ No newline at end of file diff --git a/TODO b/TODO new file mode 100644 index 0000000..2cd205f --- /dev/null +++ b/TODO @@ -0,0 +1,7 @@ + +- add variables for the configuration + +$USER calling user +$GROUP calling group + +- better pattern matching (especially for cmdlines) diff --git a/VERSION b/VERSION new file mode 100644 index 0000000..d3827e7 --- /dev/null +++ b/VERSION @@ -0,0 +1 @@ +1.0 diff --git a/cmdline.h b/cmdline.h new file mode 100644 index 0000000..dcd2ca3 --- /dev/null +++ b/cmdline.h @@ -0,0 +1,198 @@ +/* + + Command line tools + + Copyright (C) ETEC Corporation / SCICOM Group + All rights reserved. + + DATE = 19980811//cane//der.eine + +*/ + +#ifndef __cmdline_tools__ +#define __cmdline_tools__ + +#include +#include + +//#ifdef __cplusplus +//extern "C" { +//#endif + +//#ifndef CMDLINE_SPACE +//#define CMDLINE_SPACE_DEF ' ' +// static char CMDLINE_SPACE = CMDLINE_SPACE_DEF; +//#endif + +//#pragma hdrstop +#define SplitCommandLine(l,b) SplitCommandLineExt(l,b," \t\n") + +static inline int __is_cmdline_space ( char c, const char * spaces ) +{ + while (*spaces) { + if ((*spaces)==c) return 1; + spaces++; + } + return 0; +} + +static int SplitCommandLineExt(const char *c,char *hello[], const char * spaces ) +{ + int paramcount = 0; + char buffer[100]; + int counter; + + while (!(*c==0)) { + /* skip the spaces */ +// while ( (!(*c==0)) && (*c==CMDLINE_SPACE) ) c++; + while ( (!(*c==0)) && (__is_cmdline_space(*c,spaces)) ) c++; + if (!(*c==0)) { + counter = 0; + /* copy non-spaces */ + if (*c=='"') { /* an "" string comes ... -> copy it ! */ + c++; + while ( (!(*c==0)) && (!(*c=='"')) ) { + buffer[counter] = *c; + counter++; + c++; + } + } + else { + while ( (!(*c==0)) && (!(__is_cmdline_space(*c, spaces))) ) { + buffer[counter] = *c; + counter++; + c++; + } + } + /* copy the buffer into argv */ + buffer[counter] = 0; + counter++; + hello[paramcount] = (char*)malloc(counter++); + strcpy(hello[paramcount],buffer); + paramcount++; + } + } + /* do some rest work */ + return paramcount++; +} + +static int KillCommandLine(int argc, char * argv[]) +{ + int n; + if (argc==0) return 0; +// for (n=0; n('0'-1)) && ((*str)<('9'+1)) ) { x = x * 10 + (*str) - '0'; str++; } + return x; +} + +static int GetValueX(const char * str, int * ret) +{ + if (ret==NULL) return -1; + if (str==NULL) return -1; + + *ret = 0; + while ( ((*str)>('0'-1)) && ((*str)<('9'+1)) ) { (*ret) = (*ret) * 10 + (*str) - '0'; str++; } + if ((*str)==0) return 1; + return 0; +} + +static unsigned char HexToChar ( unsigned char a, unsigned char b ) +{ + unsigned char c; + + c = 0; + + if ( (a>('0'-1)) && (a<('9'+1)) ) c += a - '0'; + if ( (a>('A'-1)) && (a<('F'+1)) ) c += a - 'A' + 10; + if ( (a>('a'-1)) && (a<('f'+1)) ) c += a - 'a' + 10; + + c *= 16; + + if ( (b>('0'-1)) && (b<('9'+1)) ) c += b - '0'; + if ( (b>('A'-1)) && (b<('F'+1)) ) c += b - 'A' + 10; + if ( (b>('a'-1)) && (b<('f'+1)) ) c += b - 'a' + 10; + + return c; +} + +static int GetHexValueBuf(const char * str, char * buffer,int bufmax) +{ + int a; + int x; + int y; + + a = strlen ( str ); + + if (a % 2 ) { /* ungerade stellenanzahl */ + buffer[0] = HexToChar ( '0' , str[0] ); + x = 1; y = 1; + } + else { + x = 0; y = 0; + } + + while ((str[x])&&(y +#include +#include +#include +#include +#include +#include +#include "cmdline.h" + +#define CONFIGFILE "/etc/su-wrapper.conf" +typedef const char * CHR; + +int verbose = 0; + +CHR extract ( CHR fn ) +{ + CHR key; + + key = fn + strlen(fn); + if (key==fn) return NULL; /* hmm... no command */ + + while ( (*key)!='/' ) { + if (key==fn) return key; + key--; + } + key++; + return key; +} + +#define ALLOW 0 +#define DENY 1 + +typedef struct tagENTRY ENTRY; + +struct tagENTRY { + /* this must match with the calling params */ + char * called_user; + char * called_group; + char * called_command; + char * called_cmdline; + + /* this will be executed */ + char * run_user; + char * run_group; + char * run_command; + + char * params; + + ENTRY * next; +}; + +ENTRY * entries = NULL; + +int add_entry ( + CHR called_user, CHR called_group, CHR called_command, CHR called_cmdline, + CHR run_user, CHR run_group, CHR run_cmdline, CHR param +) +{ + ENTRY * ent; + ENTRY * walk; + + ent = (ENTRY*)malloc(sizeof(ENTRY)); + ent->next = NULL; + ent->called_user = strdup(called_user); + ent->called_group = strdup(called_group); + ent->called_command = strdup(called_command); + ent->called_cmdline = strdup(called_cmdline); + ent->run_user = strdup(run_user); + ent->run_group = strdup(run_group); + ent->run_command = strdup(run_cmdline); + ent->params = strdup(param); + + /* we put it on the end of the list */ + if (entries==NULL) entries = ent; + else { + walk = entries; + while (walk->next) walk=walk->next; + walk->next = ent; + } +} + +int wildcard_match ( CHR mask, CHR value ) +{ + if (strcmp(mask, "-")==0) return 1; /* ignore -> match any */ + if (strcmp(mask, "*")==0) return 1; /* match any */ + /* real wildcars not yet implemented */ + if (strcmp(mask, value)==0) return 1; /* direct match */ + return 0; +} + +int cmdline_match ( CHR mask, CHR value ) +{ + if (wildcard_match(mask, value)) return 1; + else { + int mask_argc; + char * mask_argv[32]; + int val_argc; + char * val_argv[32]; + int x; + + mask_argc = SplitCommandLine ( mask, (char**)&mask_argv ); + val_argc = SplitCommandLine ( value,(char**) &val_argv ); + + /* currently no wildcards are supported at this level */ + if (mask_argc!=val_argc) goto __out__failed; + for (x=0; xcalled_user, called_user)) return 0; + /* compare the group */ + if (!wildcard_match(ent->called_group, called_group)) return 0; + /* compare the called_command */ + if (!wildcard_match(ent->called_command, called_command)) return 0; + /* compare the called cmdline */ + if (!cmdline_match(ent->called_cmdline, called_cmdline)) return 0; + return 1; +} + +ENTRY * FindMatching ( CHR called_user, CHR called_group, CHR called_cmd, CHR called_cmdline ) +{ + ENTRY * walk; + ENTRY * found; + + if (called_user==NULL) called_user = "nobody"; + if (called_group==NULL) called_group = "nogroup"; + + if (verbose) { + printf("Trying to match : user=\"%s\" group=\"%s\" cmd=\"%s\" param=\"%s\"\n", + called_user, called_group, called_cmd, called_cmdline ); + } + + found = NULL; + walk = entries; + while (walk) { + if (try_to_match(walk, called_user, called_group, + called_cmd, called_cmdline )) { + found = walk; + if (verbose) { + printf("Found match: run_user=\"%s\" run_group=\"%s\" run_cmdline=\"%s\" \n", + found->run_user, found->run_group, found->run_command ); + } + } + walk = walk->next; + } + + return found; +} + +char * get_current_user () +{ + struct passwd * pw; + int uid; + + uid = getuid(); + setpwent(); + + while (pw = getpwent()) { + if (pw->pw_uid == uid) { + return pw->pw_name; + } + } + endpwent(); + printf("could not determine current user name ... defaulting to nobody\n"); + return "nobody"; +} + +char * get_current_group () +{ + return "users"; +} + +int lookup_uid ( char * name ) +{ + struct passwd * pw; + + setpwent(); + + while (pw = getpwent()) { + if (strcmp(pw->pw_name, name)==0) return pw->pw_uid; + } + + endpwent(); + return -1; +} + +int lookup_gid ( char * name ) +{ + /* FIXME!!!! */ + + if (strcmp(name,"root")==0) return 0; + if (strcmp(name,"users")==0) return 100; + if (strcmp(name,"daemon")==0) return 2; + return -1; +} + +int do_su ( CHR cmd, CHR cmdline ) +{ + ENTRY * entry; + int new_uid; + int new_gid; + + entry = FindMatching ( get_current_user(), get_current_group(), + cmd, cmdline ); + if (entry==NULL) { + printf("su_wrapper: permission denied\n"); + return 0; + } + + if (strcmp(entry->run_command, "-")==0) { + printf("su_wrapper: explicitly forbidden\n"); + return 0; + } + new_uid = lookup_uid(entry->run_user); + if (new_uid==-1) { + printf("su_wrapper: no such user \"%s\"\n", entry->run_user); + return 0; + } + new_gid = lookup_gid(entry->run_group); + + if (verbose) { + printf("Calling command : cmdline=\"%s\" user=\"%s\"(%d:%d) \n", + entry->run_command, entry->run_user, new_uid, new_gid ); + } + + if (setgid(new_gid)==-1) { +// printf("su_wrapper: setgid() permission denied ! \n"); +// return 0; + } + + if (setreuid(new_uid, new_uid)==-1) { + printf("su_wrapper: setreuid() permission denied ! \n"); + printf(" did you set the SUID bit on the su_wrapper executable ?\n"); + return 0; + } + + return system ( entry->run_command ); +} + +int read_line ( int fd, char * buffer ) +{ + int ret; + char * buf; + + buf = buffer; + + while (1) { +__loop: + ret = read(fd, buf, 1); + if (ret==0) goto __eof; + if (ret!=1) goto __err; + + if ((*buf)==10) goto __ln; + if ((*buf)==13) goto __ln; + buf++; + } +__err: + *buf = 0; + return -errno; +__eof: + *buf = 0; + if (buf==buffer) return 0; + return 1; +__ln: + if (buf==buffer) goto __loop; + *buf = 0; + return 1; +} + +int load_table ( CHR filename ) +{ + int fd; + char buffer[512]; + int ret; + char * chr; + int argc; + char * argv[16]; + int x; + + fd = open ( filename, O_RDONLY ); + if (fd<0) { + printf("WARN: su_wrapper: could not load table \"%s\"\n", filename); + return 0; + } + + while (ret=read_line(fd, (char*)&buffer)==1) { + /* skip out comments */ + chr = (char*)&buffer; + while (*chr) { + if ((*chr)=='#') *chr = 0; + else chr++; + } + if (strcmp((char*)&buffer,"")==0); + else { + char * __user = ""; + char * __group = ""; + char * __command = ""; + char * __cmdline = ""; + char * __param = ""; + char * __r_user = ""; + char * __r_group = ""; + char * __r_cmdline = ""; + + argc = SplitCommandLine ( (char*)&buffer, (char**)&argv ); + + if (argc>0) __user = argv[0]; + if (argc>1) __group = argv[1]; + if (argc>2) __command = argv[2]; + if (argc>3) __cmdline = argv[3]; + if (argc>4) __r_user = argv[4]; + if (argc>5) __r_group = argv[5]; + if (argc>6) __r_cmdline = argv[6]; + + add_entry ( __user, __group, __command, __cmdline, + __r_user, __r_group, __r_cmdline, __param ); + } + } + + close ( fd ); + return 1; +} + +int main (int argc, char * argv[]) +{ + char cmd_buffer[1024]; + int x; + + cmd_buffer[0] = 0; + x = 1; + + if ((argc>1)&&(strcmp(argv[1],"--verbose")==0)) { + verbose = 1; + x++; + } + + while (x the user which may call it. (use * for all users) +# Group -> the group which may call it (user * for all groups) +# Command -> the argv[0] su-wrapper is called with (wildcards allowed) +# Cmdline -> the argv[1]+argv[2]+... su-wrapper is called with (wildcards allowed) +# EUser -> the effective user under which the command is executed +# ( - for ignore and use the same user ) +# EGroup -> the change the group to this. +# ECommand -> execute this command +# Params -> additional params - not implementet yet. +# +# Note: the command line is splitted in the command (argv[0]) +# and cmdline (argv[1]+argv[2]...) +# +# this eases the usage of symlinks. + +# IMPORTANT: the lines are processes up to down - the last match +# is significant. so if you wann deny some special things, +# you have to put them under those lines which would allow them. + +* * lpd * root root /usr/sbin/lpd.real +* * uucp-poll * root root /usr/bin/autopoll +* * inet-up * root root /usr/bin/autonet on +* * inet-down * root root /usr/bin/autonet off +* * inet-poll * root root /usr/bin/autonet poll +* * XServer * root root /usr/X11R6/bin/X +* * rootshell * root root /bin/sh + +# deny nobody everything, each call from nobody ends up in an empty command +nobody - * * - - - -- 2.11.4.GIT