/* * Copyright (c) 1994-1996,1998-2006 Todd C. Miller * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. * * Sponsored in part by the Defense Advanced Research Projects * Agency (DARPA) and Air Force Research Laboratory, Air Force * Materiel Command, USAF, under agreement number F39502-99-1-0512. */ #include #include #include #include #include #ifdef STDC_HEADERS # include # include #else # ifdef HAVE_STDLIB_H # include # endif #endif /* STDC_HEADERS */ #ifdef HAVE_STRING_H # include #else # ifdef HAVE_STRINGS_H # include # endif #endif /* HAVE_STRING_H */ #ifdef HAVE_UNISTD_H # include #endif /* HAVE_UNISTD_H */ #ifdef HAVE_ERR_H # include #else # include "emul/err.h" #endif /* HAVE_ERR_H */ #include #include #include #ifdef HAVE_LOGIN_CAP_H # include #endif #include "sudo.h" #ifndef lint __unused static const char rcsid[] = "$Sudo: set_perms.c,v 1.30.2.7 2007/11/27 23:41:23 millert Exp $"; #endif /* lint */ #ifdef __TANDEM # define ROOT_UID 65535 #else # define ROOT_UID 0 #endif /* * Prototypes */ static void runas_setup __P((void)); static void runas_setgroups __P((void)); static void restore_groups __P((void)); static int current_perm = -1; #ifdef HAVE_SETRESUID /* * Set real and effective and saved uids and gids based on perm. * We always retain a saved uid of 0 unless we are headed for an exec(). * We only flip the effective gid since it only changes for PERM_SUDOERS. * This version of set_perms() works fine with the "stay_setuid" option. */ void set_perms(perm) int perm; { if (perm == current_perm) return; switch (perm) { case PERM_ROOT: if (setresuid(ROOT_UID, ROOT_UID, ROOT_UID)) errx(1, "setresuid(ROOT_UID, ROOT_UID, ROOT_UID) failed, your operating system may have a broken setresuid() function\nTry running configure with --disable-setresuid"); (void) setresgid(-1, user_gid, -1); if (current_perm == PERM_RUNAS) restore_groups(); break; case PERM_USER: (void) setresgid(-1, user_gid, -1); if (setresuid(user_uid, user_uid, ROOT_UID)) err(1, "setresuid(user_uid, user_uid, ROOT_UID)"); break; case PERM_FULL_USER: /* headed for exec() */ (void) setgid(user_gid); if (setresuid(user_uid, user_uid, user_uid)) err(1, "setresuid(user_uid, user_uid, user_uid)"); break; case PERM_RUNAS: runas_setgroups(); (void) setresgid(-1, runas_pw->pw_gid, -1); if (setresuid(-1, runas_pw->pw_uid, -1)) err(1, "unable to change to runas uid"); break; case PERM_FULL_RUNAS: /* headed for exec(), assume euid == ROOT_UID */ runas_setup(); if (setresuid(def_stay_setuid ? user_uid : runas_pw->pw_uid, runas_pw->pw_uid, runas_pw->pw_uid)) err(1, "unable to change to runas uid"); break; case PERM_SUDOERS: /* assume euid == ROOT_UID, ruid == user */ if (setresgid(-1, SUDOERS_GID, -1)) err(1, "unable to change to sudoers gid"); /* * If SUDOERS_UID == ROOT_UID and SUDOERS_MODE * is group readable we use a non-zero * uid in order to avoid NFS lossage. * Using uid 1 is a bit bogus but should * work on all OS's. */ if (SUDOERS_UID == ROOT_UID) { if ((SUDOERS_MODE & 040) && setresuid(ROOT_UID, 1, ROOT_UID)) err(1, "setresuid(ROOT_UID, 1, ROOT_UID)"); } else { if (setresuid(ROOT_UID, SUDOERS_UID, ROOT_UID)) err(1, "setresuid(ROOT_UID, SUDOERS_UID, ROOT_UID)"); } break; case PERM_TIMESTAMP: if (setresuid(ROOT_UID, timestamp_uid, ROOT_UID)) err(1, "setresuid(ROOT_UID, timestamp_uid, ROOT_UID)"); break; } current_perm = perm; } #else # ifdef HAVE_SETREUID /* * Set real and effective uids and gids based on perm. * We always retain a real or effective uid of ROOT_UID unless * we are headed for an exec(). * This version of set_perms() works fine with the "stay_setuid" option. */ void set_perms(perm) int perm; { if (perm == current_perm) return; switch (perm) { case PERM_ROOT: if (setreuid(-1, ROOT_UID)) errx(1, "setreuid(-1, ROOT_UID) failed, your operating system may have a broken setreuid() function\nTry running configure with --disable-setreuid"); if (setuid(ROOT_UID)) err(1, "setuid(ROOT_UID)"); (void) setregid(-1, user_gid); if (current_perm == PERM_RUNAS) restore_groups(); break; case PERM_USER: (void) setregid(-1, user_gid); if (setreuid(ROOT_UID, user_uid)) err(1, "setreuid(ROOT_UID, user_uid)"); break; case PERM_FULL_USER: /* headed for exec() */ (void) setgid(user_gid); if (setreuid(user_uid, user_uid)) err(1, "setreuid(user_uid, user_uid)"); break; case PERM_RUNAS: runas_setgroups(); (void) setregid(-1, runas_pw->pw_gid); if (setreuid(-1, runas_pw->pw_uid)) err(1, "unable to change to runas uid"); break; case PERM_FULL_RUNAS: /* headed for exec(), assume euid == ROOT_UID */ runas_setup(); if (setreuid(def_stay_setuid ? user_uid : runas_pw->pw_uid, runas_pw->pw_uid)) err(1, "unable to change to runas uid"); break; case PERM_SUDOERS: /* assume euid == ROOT_UID, ruid == user */ if (setregid(-1, SUDOERS_GID)) err(1, "unable to change to sudoers gid"); /* * If SUDOERS_UID == ROOT_UID and SUDOERS_MODE * is group readable we use a non-zero * uid in order to avoid NFS lossage. * Using uid 1 is a bit bogus but should * work on all OS's. */ if (SUDOERS_UID == ROOT_UID) { if ((SUDOERS_MODE & 040) && setreuid(ROOT_UID, 1)) err(1, "setreuid(ROOT_UID, 1)"); } else { if (setreuid(ROOT_UID, SUDOERS_UID)) err(1, "setreuid(ROOT_UID, SUDOERS_UID)"); } break; case PERM_TIMESTAMP: if (setreuid(ROOT_UID, timestamp_uid)) err(1, "setreuid(ROOT_UID, timestamp_uid)"); break; } current_perm = perm; } # else /* !HAVE_SETRESUID && !HAVE_SETREUID */ # ifdef HAVE_SETEUID /* * Set real and effective uids and gids based on perm. * NOTE: does not support the "stay_setuid" option. */ void set_perms(perm) int perm; { if (perm == current_perm) return; /* * Since we only have setuid() and seteuid() and semantics * for these calls differ on various systems, we set * real and effective uids to ROOT_UID initially to be safe. */ if (seteuid(ROOT_UID)) err(1, "seteuid(ROOT_UID)"); if (setuid(ROOT_UID)) err(1, "setuid(ROOT_UID)"); switch (perm) { case PERM_ROOT: /* uid set above */ (void) setegid(user_gid); if (current_perm == PERM_RUNAS) restore_groups(); break; case PERM_USER: (void) setegid(user_gid); if (seteuid(user_uid)) err(1, "seteuid(user_uid)"); break; case PERM_FULL_USER: /* headed for exec() */ (void) setgid(user_gid); if (setuid(user_uid)) err(1, "setuid(user_uid)"); break; case PERM_RUNAS: runas_setgroups(); (void) setegid(runas_pw->pw_gid); if (seteuid(runas_pw->pw_uid)) err(1, "unable to change to runas uid"); break; case PERM_FULL_RUNAS: /* headed for exec() */ runas_setup(); if (setuid(runas_pw->pw_uid)) err(1, "unable to change to runas uid"); break; case PERM_SUDOERS: if (setegid(SUDOERS_GID)) err(1, "unable to change to sudoers gid"); /* * If SUDOERS_UID == ROOT_UID and SUDOERS_MODE * is group readable we use a non-zero * uid in order to avoid NFS lossage. * Using uid 1 is a bit bogus but should * work on all OS's. */ if (SUDOERS_UID == ROOT_UID) { if ((SUDOERS_MODE & 040) && seteuid(1)) err(1, "seteuid(1)"); } else { if (seteuid(SUDOERS_UID)) err(1, "seteuid(SUDOERS_UID)"); } break; case PERM_TIMESTAMP: if (seteuid(timestamp_uid)) err(1, "seteuid(timestamp_uid)"); break; } current_perm = perm; } # else /* !HAVE_SETRESUID && !HAVE_SETREUID && !HAVE_SETEUID */ /* * Set uids and gids based on perm via setuid() and setgid(). * NOTE: does not support the "stay_setuid" or timestampowner options. * Also, SUDOERS_UID and SUDOERS_GID are not used. */ void set_perms(perm) int perm; { if (perm == current_perm) return; switch (perm) { case PERM_ROOT: if (setuid(ROOT_UID)) err(1, "setuid(ROOT_UID)"); if (current_perm == PERM_RUNAS) restore_groups(); break; case PERM_FULL_USER: (void) setgid(user_gid); if (setuid(user_uid)) err(1, "setuid(user_uid)"); break; case PERM_FULL_RUNAS: runas_setup(); if (setuid(runas_pw->pw_uid)) err(1, "unable to change to runas uid"); break; case PERM_USER: case PERM_SUDOERS: case PERM_RUNAS: case PERM_TIMESTAMP: /* Unsupported since we can't set euid. */ break; } current_perm = perm; } # endif /* HAVE_SETEUID */ # endif /* HAVE_SETREUID */ #endif /* HAVE_SETRESUID */ #ifdef HAVE_INITGROUPS static void runas_setgroups() { static int ngroups = -1; static GETGROUPS_T *groups; struct passwd *pw; if (def_preserve_groups) return; /* * Use stashed copy of runas groups if available, else initgroups and stash. */ if (ngroups == -1) { pw = runas_pw ? runas_pw : sudo_user.pw; if (initgroups(pw->pw_name, pw->pw_gid) < 0) log_error(USE_ERRNO|MSG_ONLY, "can't set runas group vector"); if ((ngroups = getgroups(0, NULL)) < 0) log_error(USE_ERRNO|MSG_ONLY, "can't get runas ngroups"); groups = emalloc2(ngroups, sizeof(GETGROUPS_T)); if (getgroups(ngroups, groups) < 0) log_error(USE_ERRNO|MSG_ONLY, "can't get runas group vector"); } else { if (setgroups(ngroups, groups) < 0) log_error(USE_ERRNO|MSG_ONLY, "can't set runas group vector"); } } static void restore_groups() { if (setgroups(user_ngroups, user_groups) < 0) log_error(USE_ERRNO|MSG_ONLY, "can't reset user group vector"); } #else static void runas_setgroups() { /* STUB */ } static void restore_groups() { /* STUB */ } #endif /* HAVE_INITGROUPS */ static void runas_setup() { #ifdef HAVE_LOGIN_CAP_H int flags; extern login_cap_t *lc; #endif if (runas_pw->pw_name != NULL) { #ifdef HAVE_PAM pam_prep_user(runas_pw); #endif /* HAVE_PAM */ #ifdef HAVE_LOGIN_CAP_H if (def_use_loginclass) { /* * We only use setusercontext() set the nice value and rlimits. */ flags = LOGIN_SETRESOURCES|LOGIN_SETPRIORITY; if (!def_preserve_groups) SET(flags, LOGIN_SETGROUP); else if (setgid(runas_pw->pw_gid)) warn("cannot set gid to runas gid"); if (setusercontext(lc, runas_pw, runas_pw->pw_uid, flags)) { if (runas_pw->pw_uid != ROOT_UID) err(1, "unable to set user context"); else warn("unable to set user context"); } } #endif /* HAVE_LOGIN_CAP_H */ if (setgid(runas_pw->pw_gid)) warn("cannot set gid to runas gid"); /* * Initialize group vector unless asked not to. */ runas_setgroups(); } }