|
Lines 507-515
user_key_command_allowed2(struct passwd *user_pw, Key *key)
Link Here
|
| 507 |
int ok, found_key = 0; |
507 |
int ok, found_key = 0; |
| 508 |
struct passwd *pw; |
508 |
struct passwd *pw; |
| 509 |
struct stat st; |
509 |
struct stat st; |
| 510 |
int status, devnull, p[2], i; |
510 |
int status, devnull, p[2], i, argc; |
| 511 |
pid_t pid; |
511 |
pid_t pid; |
| 512 |
char *username, errmsg[512]; |
512 |
char *username, errmsg[512]; |
|
|
513 |
char *cp, *command = NULL, **argv = NULL; |
| 514 |
char *authorized_keys_command_path; |
| 515 |
char *key_fp = NULL, *keytext = NULL; |
| 516 |
size_t keytextlen; |
| 513 |
|
517 |
|
| 514 |
if (options.authorized_keys_command == NULL || |
518 |
if (options.authorized_keys_command == NULL || |
| 515 |
options.authorized_keys_command[0] != '/') |
519 |
options.authorized_keys_command[0] != '/') |
|
Lines 533-544
user_key_command_allowed2(struct passwd *user_pw, Key *key)
Link Here
|
| 533 |
|
537 |
|
| 534 |
temporarily_use_uid(pw); |
538 |
temporarily_use_uid(pw); |
| 535 |
|
539 |
|
| 536 |
if (stat(options.authorized_keys_command, &st) < 0) { |
540 |
if (strstr(options.authorized_keys_command, "%f") != NULL) { |
|
|
541 |
key_fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX); |
| 542 |
if (key_fp == NULL) { |
| 543 |
error("AuthorizedKeysCommand %%f parameter expansion failed"); |
| 544 |
goto out; |
| 545 |
} |
| 546 |
} |
| 547 |
if (strstr(options.authorized_keys_command, "%k") != NULL) { |
| 548 |
if (key_to_base64(key, &keytext, &keytextlen) != 0) { |
| 549 |
error("AuthorizedKeysCommand %%k parameter expansion failed"); |
| 550 |
goto out; |
| 551 |
} |
| 552 |
} |
| 553 |
command = cp = percent_expand(options.authorized_keys_command, |
| 554 |
"u", user_pw->pw_name, "h", user_pw->pw_dir, "t", key_ssh_name(key), |
| 555 |
"f", key_fp == NULL ? "" : key_fp, |
| 556 |
"k", keytext == NULL ? "" : keytext, (char *)NULL); |
| 557 |
i = 0; |
| 558 |
argc = 10; |
| 559 |
while (cp != NULL) { |
| 560 |
if (argv == NULL || i == argc - 1) { |
| 561 |
argc *= 2; |
| 562 |
argv = xrealloc(argv, argc, sizeof(char *)); |
| 563 |
} |
| 564 |
argv[i++] = strdelim(&cp); |
| 565 |
argv[i] = NULL; |
| 566 |
debug3("AuthorizedKeysCommand argv[%d]: %s", |
| 567 |
i - 1, argv[i - 1]); |
| 568 |
} |
| 569 |
if (argv[1] == NULL) { |
| 570 |
argv[1] = user_pw->pw_name; |
| 571 |
argv[2] = NULL; |
| 572 |
debug3("AuthorizedKeysCommand argv[1]: %s", argv[1]); |
| 573 |
} |
| 574 |
authorized_keys_command_path = argv[0]; |
| 575 |
|
| 576 |
if (stat(authorized_keys_command_path, &st) < 0) { |
| 537 |
error("Could not stat AuthorizedKeysCommand \"%s\": %s", |
577 |
error("Could not stat AuthorizedKeysCommand \"%s\": %s", |
| 538 |
options.authorized_keys_command, strerror(errno)); |
578 |
authorized_keys_command_path, strerror(errno)); |
| 539 |
goto out; |
579 |
goto out; |
| 540 |
} |
580 |
} |
| 541 |
if (auth_secure_path(options.authorized_keys_command, &st, NULL, 0, |
581 |
if (auth_secure_path(authorized_keys_command_path, &st, NULL, 0, |
| 542 |
errmsg, sizeof(errmsg)) != 0) { |
582 |
errmsg, sizeof(errmsg)) != 0) { |
| 543 |
error("Unsafe AuthorizedKeysCommand: %s", errmsg); |
583 |
error("Unsafe AuthorizedKeysCommand: %s", errmsg); |
| 544 |
goto out; |
584 |
goto out; |
|
Lines 549-556
user_key_command_allowed2(struct passwd *user_pw, Key *key)
Link Here
|
| 549 |
goto out; |
589 |
goto out; |
| 550 |
} |
590 |
} |
| 551 |
|
591 |
|
| 552 |
debug3("Running AuthorizedKeysCommand: \"%s %s\" as \"%s\"", |
592 |
debug3("Running AuthorizedKeysCommand: \"%s ...\" as \"%s\"", |
| 553 |
options.authorized_keys_command, user_pw->pw_name, pw->pw_name); |
593 |
authorized_keys_command_path, pw->pw_name); |
| 554 |
|
594 |
|
| 555 |
/* |
595 |
/* |
| 556 |
* Don't want to call this in the child, where it can fatal() and |
596 |
* Don't want to call this in the child, where it can fatal() and |
|
Lines 563-568
user_key_command_allowed2(struct passwd *user_pw, Key *key)
Link Here
|
| 563 |
error("%s: fork: %s", __func__, strerror(errno)); |
603 |
error("%s: fork: %s", __func__, strerror(errno)); |
| 564 |
close(p[0]); |
604 |
close(p[0]); |
| 565 |
close(p[1]); |
605 |
close(p[1]); |
|
|
606 |
free(argv); |
| 607 |
free(command); |
| 608 |
if (keytext != NULL) |
| 609 |
free(keytext); |
| 610 |
if (key_fp != NULL) |
| 611 |
free(key_fp); |
| 566 |
return 0; |
612 |
return 0; |
| 567 |
case 0: /* child */ |
613 |
case 0: /* child */ |
| 568 |
for (i = 0; i < NSIG; i++) |
614 |
for (i = 0; i < NSIG; i++) |
|
Lines 598-608
user_key_command_allowed2(struct passwd *user_pw, Key *key)
Link Here
|
| 598 |
_exit(1); |
644 |
_exit(1); |
| 599 |
} |
645 |
} |
| 600 |
|
646 |
|
| 601 |
execl(options.authorized_keys_command, |
647 |
execv(authorized_keys_command_path, argv); |
| 602 |
options.authorized_keys_command, user_pw->pw_name, NULL); |
|
|
| 603 |
|
648 |
|
| 604 |
error("AuthorizedKeysCommand %s exec failed: %s", |
649 |
error("AuthorizedKeysCommand %s exec failed: %s", |
| 605 |
options.authorized_keys_command, strerror(errno)); |
650 |
authorized_keys_command_path, strerror(errno)); |
| 606 |
_exit(127); |
651 |
_exit(127); |
| 607 |
default: /* parent */ |
652 |
default: /* parent */ |
| 608 |
break; |
653 |
break; |
|
Lines 620-626
user_key_command_allowed2(struct passwd *user_pw, Key *key)
Link Here
|
| 620 |
; |
665 |
; |
| 621 |
goto out; |
666 |
goto out; |
| 622 |
} |
667 |
} |
| 623 |
ok = check_authkeys_file(f, options.authorized_keys_command, key, pw); |
668 |
ok = check_authkeys_file(f, authorized_keys_command_path, key, pw); |
| 624 |
fclose(f); |
669 |
fclose(f); |
| 625 |
|
670 |
|
| 626 |
while (waitpid(pid, &status, 0) == -1) { |
671 |
while (waitpid(pid, &status, 0) == -1) { |
|
Lines 631-645
user_key_command_allowed2(struct passwd *user_pw, Key *key)
Link Here
|
| 631 |
} |
676 |
} |
| 632 |
if (WIFSIGNALED(status)) { |
677 |
if (WIFSIGNALED(status)) { |
| 633 |
error("AuthorizedKeysCommand %s exited on signal %d", |
678 |
error("AuthorizedKeysCommand %s exited on signal %d", |
| 634 |
options.authorized_keys_command, WTERMSIG(status)); |
679 |
authorized_keys_command_path, WTERMSIG(status)); |
| 635 |
goto out; |
680 |
goto out; |
| 636 |
} else if (WEXITSTATUS(status) != 0) { |
681 |
} else if (WEXITSTATUS(status) != 0) { |
| 637 |
error("AuthorizedKeysCommand %s returned status %d", |
682 |
error("AuthorizedKeysCommand %s returned status %d", |
| 638 |
options.authorized_keys_command, WEXITSTATUS(status)); |
683 |
authorized_keys_command_path, WEXITSTATUS(status)); |
| 639 |
goto out; |
684 |
goto out; |
| 640 |
} |
685 |
} |
| 641 |
found_key = ok; |
686 |
found_key = ok; |
| 642 |
out: |
687 |
out: |
|
|
688 |
if (argv != NULL) |
| 689 |
free(argv); |
| 690 |
if (command != NULL) |
| 691 |
free(command); |
| 692 |
if (keytext != NULL) |
| 693 |
free(keytext); |
| 694 |
if (key_fp != NULL) |
| 695 |
free(key_fp); |
| 643 |
restore_uid(); |
696 |
restore_uid(); |
| 644 |
return found_key; |
697 |
return found_key; |
| 645 |
} |
698 |
} |