mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2024-11-15 23:05:49 +01:00
191 lines
4.3 KiB
C
191 lines
4.3 KiB
C
/* change password or add user to S/KEY authentication system.
|
|
* S/KEY is a tradmark of Bellcore */
|
|
|
|
#include <ctype.h>
|
|
#include <err.h>
|
|
#include <pwd.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <time.h>
|
|
|
|
#include <skey.h>
|
|
#include <unistd.h>
|
|
|
|
#define NAMELEN 2
|
|
|
|
int
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
struct skey skey;
|
|
int rval,n,nn,i,defaultsetup;
|
|
char seed[18],tmp[80],key[8];
|
|
struct passwd *ppuser,*pp;
|
|
char defaultseed[17], passwd[256],passwd2[256] ;
|
|
|
|
|
|
time_t now;
|
|
struct tm *tm;
|
|
char tbuf[27],buf[60];
|
|
char lastc, me[80];
|
|
int l;
|
|
|
|
time(&now);
|
|
#if 0 /* Choose a more random seed */
|
|
tm = localtime(&now);
|
|
strftime(tbuf, sizeof(tbuf), "%M%j", tm);
|
|
#else
|
|
sprintf(tbuf, "%05ld", (long) (now % 100000));
|
|
#endif
|
|
gethostname(defaultseed,NAMELEN);
|
|
strcpy(&defaultseed[NAMELEN],tbuf);
|
|
|
|
pp = ppuser = getpwuid(getuid());
|
|
strcpy(me,pp->pw_name);
|
|
defaultsetup = 1;
|
|
if( argc > 1){
|
|
if(strcmp("-s", argv[1]) == 0)
|
|
defaultsetup = 0;
|
|
else
|
|
pp = getpwnam(argv[1]);
|
|
if(argc > 2)
|
|
pp = getpwnam(argv[2]);
|
|
|
|
}
|
|
if(pp == NULL){
|
|
printf("User unknown\n");
|
|
return 1;
|
|
}
|
|
if(strcmp( pp->pw_name,me) != 0){
|
|
if(getuid() != 0){
|
|
/* Only root can change other's passwds */
|
|
printf("Permission denied.\n");
|
|
return(1);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
rval = skeylookup(&skey,pp->pw_name);
|
|
switch(rval){
|
|
case -1:
|
|
perror("error in opening database");
|
|
return 1;
|
|
case 0:
|
|
printf("Updating %s:\n",pp->pw_name);
|
|
printf("Old key: %s\n",skey.seed);
|
|
/* lets be nice if they have a skey.seed that ends in 0-8 just add one*/
|
|
l = strlen(skey.seed);
|
|
if( l > 0){
|
|
lastc = skey.seed[l-1];
|
|
if( isdigit(lastc) && lastc != '9' ){
|
|
strcpy(defaultseed, skey.seed);
|
|
defaultseed[l-1] = lastc + 1;
|
|
}
|
|
if( isdigit(lastc) && lastc == '9' && l < 16){
|
|
strcpy(defaultseed, skey.seed);
|
|
defaultseed[l-1] = '0';
|
|
defaultseed[l] = '0';
|
|
defaultseed[l+1] = '\0';
|
|
}
|
|
}
|
|
break;
|
|
case 1:
|
|
skey.val = 0; /* XXX */
|
|
printf("Adding %s:\n",pp->pw_name);
|
|
break;
|
|
}
|
|
n = 99;
|
|
if( ! defaultsetup){
|
|
printf("Reminder you need the 6 english words from the key command.\n");
|
|
for(i=0;;i++){
|
|
if(i >= 2) exit(1);
|
|
printf("Enter sequence count from 1 to 9999: ");
|
|
fgets(tmp,sizeof(tmp),stdin);
|
|
n = atoi(tmp);
|
|
if(n > 0 && n < 10000)
|
|
break; /* Valid range */
|
|
printf("Count must be > 0 and < 10000\n");
|
|
}
|
|
}
|
|
if( !defaultsetup){
|
|
printf("Enter new key [default %s]: ", defaultseed);
|
|
fflush(stdout);
|
|
fgets(seed,sizeof(seed),stdin);
|
|
rip(seed);
|
|
if(strlen(seed) > 16){
|
|
printf("Seed truncated to 16 chars\n");
|
|
seed[16] = '\0';
|
|
}
|
|
if( seed[0] == '\0') strcpy(seed,defaultseed);
|
|
for(i=0;;i++){
|
|
if(i >= 2) exit(1);
|
|
printf("s/key %d %s\ns/key access password: ",n,seed);
|
|
fgets(tmp,sizeof(tmp),stdin);
|
|
rip(tmp);
|
|
if(tmp[0] == '?'){
|
|
printf("Enter 6 English words from secure S/Key calculation.\n");
|
|
continue;
|
|
}
|
|
if(tmp[0] == '\0'){
|
|
exit(1);
|
|
}
|
|
if(etob(key,tmp) == 1 || atob8(key,tmp) == 0)
|
|
break; /* Valid format */
|
|
printf("Invalid format, try again with 6 English words.\n");
|
|
}
|
|
} else {
|
|
/* Get user's secret password */
|
|
fprintf(stderr,"Reminder - Only use this method if you are directly connected.\n");
|
|
fprintf(stderr,"If you are using telnet or rlogin exit with no password and use keyinit -s.\n");
|
|
for(i=0;;i++){
|
|
if(i >= 2) exit(1);
|
|
fprintf(stderr,"Enter secret password: ");
|
|
readpass(passwd,sizeof(passwd));
|
|
if(passwd[0] == '\0'){
|
|
exit(1);
|
|
}
|
|
fprintf(stderr,"Again secret password: ");
|
|
readpass(passwd2,sizeof(passwd));
|
|
if(passwd2[0] == '\0'){
|
|
exit(1);
|
|
}
|
|
if(strlen(passwd) < 4 && strlen(passwd2) < 4) {
|
|
fprintf(stderr, "Sorry your password must be longer\n\r");
|
|
exit(1);
|
|
}
|
|
if(strcmp(passwd,passwd2) == 0) break;
|
|
fprintf(stderr, "Sorry no match\n");
|
|
|
|
|
|
}
|
|
strcpy(seed,defaultseed);
|
|
|
|
/* Crunch seed and password into starting key */
|
|
if(keycrunch(key,seed,passwd) != 0)
|
|
errx(1, "key crunch failed");
|
|
nn = n;
|
|
while(nn-- != 0)
|
|
f(key);
|
|
}
|
|
time(&now);
|
|
tm = localtime(&now);
|
|
strftime(tbuf, sizeof(tbuf), " %b %d,%Y %T", tm);
|
|
if (skey.val == NULL)
|
|
skey.val = (char *) malloc(16+1);
|
|
|
|
|
|
btoa8(skey.val,key);
|
|
fprintf(skey.keyfile,"%s %04d %-16s %s %-21s\n",pp->pw_name,n,
|
|
seed,skey.val, tbuf);
|
|
fclose(skey.keyfile);
|
|
printf("\nID %s s/key is %d %s\n",pp->pw_name,n,seed);
|
|
printf("%s\n",btoe(buf,key));
|
|
#ifdef HEXIN
|
|
printf("%s\n",put8(buf,key));
|
|
#endif
|
|
return 0;
|
|
}
|