Moving micasa 1.5 trunk to Novell forge.
This commit is contained in:
20
login_capture/PAM/Makefile
Normal file
20
login_capture/PAM/Makefile
Normal file
@@ -0,0 +1,20 @@
|
||||
#
|
||||
# configure environment
|
||||
#
|
||||
TARGET = pam_micasa
|
||||
include global.mak
|
||||
include defaults.$(PLAT)
|
||||
include rules.mak
|
||||
|
||||
BIN_NAME = $(TARGET)$(xtra).$(BIN)
|
||||
LIB_NAME = $(TARGET)$(xtra).$(LIB)
|
||||
|
||||
#
|
||||
# target object and source files
|
||||
#
|
||||
include objs.$(PLAT)
|
||||
|
||||
#
|
||||
# targets
|
||||
#
|
||||
include target.cl
|
||||
10
login_capture/PAM/link.lux
Normal file
10
login_capture/PAM/link.lux
Normal file
@@ -0,0 +1,10 @@
|
||||
LINK = $(CC) \
|
||||
-Wl,-Bsymbolic \
|
||||
-shared \
|
||||
-Wl,--version-script=$(TARGET)_$(PLAT).exp \
|
||||
-Wl,-rpath -Wl,/usr/$(ARCH_LlB) \
|
||||
-L/usr/$(ARCH_LIB) -lpthread -lc -ldl -lpam \
|
||||
-Wl,-soname -Wl,$(TARGET).so \
|
||||
-o $(LIBDIR)$(XTRA)/$(TARGET).so \
|
||||
-L$(LIBDIR)$(XTRA) \
|
||||
$(OBJDIR)*.$(O)
|
||||
3
login_capture/PAM/objs.lux
Normal file
3
login_capture/PAM/objs.lux
Normal file
@@ -0,0 +1,3 @@
|
||||
OBJS=\
|
||||
pam_sscs_utils.$(O) \
|
||||
pam_sscs.$(O)
|
||||
11
login_capture/PAM/pam_csss_lux.exp
Normal file
11
login_capture/PAM/pam_csss_lux.exp
Normal file
@@ -0,0 +1,11 @@
|
||||
VER_1.0
|
||||
{
|
||||
global:
|
||||
pam_sm_authenticate;
|
||||
pam_sm_setcred;
|
||||
pam_sm_acct_mgmt;
|
||||
pam_sm_open_session;
|
||||
pam_sm_close_session;
|
||||
local:
|
||||
*;
|
||||
};
|
||||
11
login_capture/PAM/pam_micasa_lux.exp
Normal file
11
login_capture/PAM/pam_micasa_lux.exp
Normal file
@@ -0,0 +1,11 @@
|
||||
VER_1.0
|
||||
{
|
||||
global:
|
||||
pam_sm_authenticate;
|
||||
pam_sm_setcred;
|
||||
pam_sm_acct_mgmt;
|
||||
pam_sm_open_session;
|
||||
pam_sm_close_session;
|
||||
local:
|
||||
*;
|
||||
};
|
||||
235
login_capture/PAM/pam_sscs.c
Normal file
235
login_capture/PAM/pam_sscs.c
Normal file
@@ -0,0 +1,235 @@
|
||||
/* miCASAd PAM module
|
||||
*
|
||||
* This is a PAM module which is used to capture the workstation
|
||||
* user/password and store the same in miCASAd .
|
||||
* This would be placed in login/xdm/gdm/kdm/sshd PAM configuration files.
|
||||
*
|
||||
* This module needs to be present before any other PAM module which
|
||||
* requires the services of miCASAd. It needs to be present in both
|
||||
* the auth and session stacks of the PAM configuration files.
|
||||
*
|
||||
* In the auth stack, the functionality of the module is to store
|
||||
* the workstation user/password in micasad.
|
||||
* In the session stack, the functionality of the module is to do
|
||||
* a Close of the user's SESSION Keychain.
|
||||
*
|
||||
*/
|
||||
|
||||
|
||||
#include "pam_sscs.h"
|
||||
|
||||
#define PAM_SM_AUTH
|
||||
#define PAM_SM_ACCOUNT
|
||||
#define PAM_SM_SESSION
|
||||
|
||||
#include <security/pam_modules.h>
|
||||
#include <security/_pam_macros.h>
|
||||
|
||||
PAM_EXTERN int pam_sm_authenticate(pam_handle_t *pamh,int flags,int argc,
|
||||
const char **argv)
|
||||
{
|
||||
int retVal = 0, rc = 0;
|
||||
|
||||
const char *user = NULL;
|
||||
const char *wkstnPasswd = NULL;
|
||||
|
||||
uid_t saved_uid = geteuid();
|
||||
struct passwd *passwdEntry = NULL;
|
||||
|
||||
struct pam_message msg[1], *pmsg[1];
|
||||
struct pam_response *resp;
|
||||
struct pam_conv *conv;
|
||||
|
||||
/*
|
||||
* Get the username first.
|
||||
*/
|
||||
retVal = pam_get_user(pamh, &user, NULL);
|
||||
|
||||
if ( PAM_SUCCESS != retVal )
|
||||
{
|
||||
pam_sscs_log( LOG_ERR, "pam_get_user returned error: %d - %s\n",retVal,pam_strerror(pamh,retVal));
|
||||
return PAM_SUCCESS;
|
||||
}
|
||||
|
||||
pam_get_item(pamh,PAM_AUTHTOK,(const void**)&wkstnPasswd);
|
||||
passwdEntry = getpwnam(user);
|
||||
|
||||
/* SSCS determines the client uid using the SO_PEERCRED socket option.
|
||||
* Hence the euid is temporarily modified to that of the user logging in.
|
||||
*/
|
||||
|
||||
|
||||
seteuid( passwdEntry->pw_uid );
|
||||
|
||||
do
|
||||
{
|
||||
char *error = NULL;
|
||||
void *ssContext = NULL;
|
||||
SSCS_SECRETSTORE_T ssId = {0};
|
||||
|
||||
SSCS_SECRET_ID_T secretID = {0};
|
||||
SSCS_SECRET_ID_T sharedSecretID = {0};
|
||||
|
||||
SSCS_BASIC_CREDENTIAL basicCredential;
|
||||
int credType;
|
||||
|
||||
void *nsscsIdkHandle = dlopen(NSSCSIDK_LIB,RTLD_NOW);
|
||||
if( NULL == nsscsIdkHandle )
|
||||
{
|
||||
pam_sscs_log(LOG_ERR,"Unable to open %s\n",NSSCSIDK_LIB);
|
||||
break;
|
||||
}
|
||||
|
||||
pNSSCSSetCredential = dlsym( nsscsIdkHandle,
|
||||
"miCASASetCredential");
|
||||
if( (error = dlerror()) != NULL )
|
||||
{
|
||||
pam_sscs_log(LOG_ERR,"Unable to find miCASASetCredential symbol.- %s\n",error);
|
||||
break;
|
||||
}
|
||||
|
||||
secretID.len = strlen(WORKSTATION_SECRET_ID) + 1;
|
||||
strcpy(secretID.id,WORKSTATION_SECRET_ID);
|
||||
|
||||
sharedSecretID.len = strlen(WORKSTATION_SHARED_SECRET_ID) + 1;
|
||||
strcpy(sharedSecretID.id,WORKSTATION_SHARED_SECRET_ID);
|
||||
|
||||
memset(&basicCredential,0,sizeof(basicCredential));
|
||||
|
||||
basicCredential.unFlags = 0;
|
||||
strcpy(basicCredential.username,user);
|
||||
basicCredential.unLen = strlen(user) + 1;
|
||||
strcpy(basicCredential.password,wkstnPasswd);
|
||||
basicCredential.pwordLen = strlen(wkstnPasswd) + 1;
|
||||
|
||||
retVal = (*pNSSCSSetCredential) (0,&secretID,NULL,
|
||||
SSCS_CRED_TYPE_BASIC_F,
|
||||
&basicCredential,NULL);
|
||||
if( retVal != 0)
|
||||
{
|
||||
pam_sscs_log( LOG_ERR,"Setting the default credential failed.Errcode = %d\n",retVal);
|
||||
break;
|
||||
}
|
||||
}while(0);
|
||||
|
||||
seteuid(saved_uid);
|
||||
return PAM_SUCCESS;
|
||||
}
|
||||
|
||||
PAM_EXTERN
|
||||
int pam_sm_setcred(pam_handle_t *pamh,int flags,int argc
|
||||
,const char **argv)
|
||||
{
|
||||
return PAM_SUCCESS;
|
||||
}
|
||||
|
||||
/* --- account management functions --- */
|
||||
|
||||
PAM_EXTERN
|
||||
int pam_sm_acct_mgmt(pam_handle_t *pamh,int flags,int argc
|
||||
,const char **argv)
|
||||
{
|
||||
PRINT_FN_NAME
|
||||
return PAM_SUCCESS;
|
||||
}
|
||||
|
||||
PAM_EXTERN int pam_sm_open_session(pam_handle_t *pamh,int flags,int argc
|
||||
,const char **argv)
|
||||
{
|
||||
return PAM_SUCCESS;
|
||||
}
|
||||
|
||||
PAM_EXTERN int pam_sm_close_session(pam_handle_t *pamh,int flags,int argc
|
||||
,const char **argv)
|
||||
{
|
||||
const char *user = NULL;
|
||||
int retVal = 0;
|
||||
uid_t saved_uid = geteuid();
|
||||
struct passwd *passwdEntry = NULL;
|
||||
|
||||
PRINT_FN_NAME
|
||||
|
||||
retVal = pam_get_user(pamh, &user, NULL);
|
||||
if ( PAM_SUCCESS != retVal )
|
||||
{
|
||||
pam_sscs_log( LOG_ERR, "pam_get_user returned error: %d - %s\n",retVal,pam_strerror(pamh,retVal));
|
||||
return PAM_SUCCESS;
|
||||
}
|
||||
|
||||
passwdEntry = getpwnam(user);
|
||||
|
||||
seteuid( passwdEntry->pw_uid );
|
||||
|
||||
do
|
||||
{
|
||||
char *error = NULL;
|
||||
void *ssContext = NULL;
|
||||
SSCS_SECRETSTORE_T ssId = {0};
|
||||
|
||||
void *nsscsIdkHandle = dlopen(NSSCSIDK_LIB,RTLD_NOW);
|
||||
if( NULL == nsscsIdkHandle )
|
||||
{
|
||||
pam_sscs_log(LOG_ERR,"Unable to open %s\n",NSSCSIDK_LIB);
|
||||
break;
|
||||
}
|
||||
|
||||
pNSSCSOpenSecretStoreCache = dlsym(nsscsIdkHandle,
|
||||
"miCASAOpenSecretStoreCache");
|
||||
if( (error = dlerror()) != NULL )
|
||||
{
|
||||
pam_sscs_log(LOG_ERR,"Unable to find miCASAOpenSecretStoreCache symbol. - %s\n",error);
|
||||
break;
|
||||
}
|
||||
|
||||
pNSSCSCloseSecretStoreCache = dlsym(nsscsIdkHandle,
|
||||
"miCASACloseSecretStoreCache");
|
||||
if( (error = dlerror()) != NULL )
|
||||
{
|
||||
pam_sscs_log(LOG_ERR,"Unable to find miCASACloseSecretStoreCache symbol. - %s\n",error);
|
||||
break;
|
||||
}
|
||||
strcpy(ssId.ssName, passwdEntry->pw_name);
|
||||
ssId.version = NSSCS_VERSION_NUMBER;
|
||||
|
||||
ssContext = (*pNSSCSOpenSecretStoreCache)(&ssId,0,NULL);
|
||||
if( NULL == ssContext )
|
||||
{
|
||||
pam_sscs_log( LOG_ERR,"Opening SecretStore for the user %s failed.\n",passwdEntry->pw_name);
|
||||
break;
|
||||
}
|
||||
|
||||
retVal = (*pNSSCSCloseSecretStoreCache) (ssContext,1,NULL);
|
||||
if( retVal != 0 )
|
||||
{
|
||||
pam_sscs_log(LOG_ERR,"Closing SecretStore for the user %s failed.\n",passwdEntry->pw_name);
|
||||
break;
|
||||
}
|
||||
|
||||
}while(0);
|
||||
|
||||
seteuid(saved_uid);
|
||||
return PAM_SUCCESS;
|
||||
}
|
||||
|
||||
/* end of module definition */
|
||||
|
||||
#ifdef PAM_STATIC
|
||||
|
||||
/* static module data */
|
||||
|
||||
struct pam_module _pam_passphrase_modstruct = {
|
||||
"pam_sscs",
|
||||
pam_sm_authenticate,
|
||||
pam_sm_setcred,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL
|
||||
pam_sm_acct_mgmt,
|
||||
pam_sm_open_session,
|
||||
pam_sm_close_session,
|
||||
#if 0
|
||||
pam_sm_chauthtok
|
||||
#endif
|
||||
};
|
||||
|
||||
#endif
|
||||
54
login_capture/PAM/pam_sscs.h
Normal file
54
login_capture/PAM/pam_sscs.h
Normal file
@@ -0,0 +1,54 @@
|
||||
/*
|
||||
pam_sscs.h
|
||||
*/
|
||||
#ifndef _PAM_SSCS_H
|
||||
#define _PAM_SSCS_H
|
||||
#include <dlfcn.h>
|
||||
#include <security/_pam_types.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/un.h>
|
||||
#include <errno.h>
|
||||
#include <linux/socket.h>
|
||||
#include <unistd.h>
|
||||
#include <pwd.h>
|
||||
|
||||
#include <micasa.h>
|
||||
|
||||
extern void pam_sscs_log(int priority, const char *format,...);
|
||||
|
||||
#define WORKSTATION_SECRET_ID "Desktop"
|
||||
#define WORKSTATION_SHARED_SECRET_ID "DefaultSharedSecret"
|
||||
|
||||
#define NSSCSIDK_LIB "/opt/novell/CASA/lib/libmicasa.so"
|
||||
|
||||
#define NOVELL_CSSS_CONTEXT "NOVELL_CSSS_CONTEXT"
|
||||
|
||||
#ifdef DEBUG
|
||||
#define PRINT_FN_NAME pam_sscs_log(LOG_DEBUG,"In function : %s\n",__func__);
|
||||
#else
|
||||
#define PRINT_FN_NAME
|
||||
#endif
|
||||
|
||||
void* (*pNSSCSOpenSecretStoreCache) ( SSCS_SECRETSTORE_T* ssid,
|
||||
unsigned long ssFlags,
|
||||
SSCS_EXT_T *ext);
|
||||
int (*pNSSCSCloseSecretStoreCache) ( void *context,
|
||||
unsigned long ssFlags,
|
||||
SSCS_EXT_T *ext);
|
||||
int (*pNSSCSSetCredential) ( unsigned long ssFlags,
|
||||
SSCS_SECRET_ID_T *appSecretID,
|
||||
SSCS_SECRET_ID_T *sharedSecretID,
|
||||
int credentialType,
|
||||
void *credential,
|
||||
SSCS_EXT_T *ext);
|
||||
|
||||
/* The structure to hold all the possible options
|
||||
* for this PAM module.
|
||||
*/
|
||||
typedef struct options_t
|
||||
{
|
||||
unsigned int debug;
|
||||
}Options;
|
||||
|
||||
#endif
|
||||
23
login_capture/PAM/pam_sscs_utils.c
Normal file
23
login_capture/PAM/pam_sscs_utils.c
Normal file
@@ -0,0 +1,23 @@
|
||||
/* Secret Store Client Service
|
||||
* pam_sscs_utils.c
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <syslog.h>
|
||||
#include <stdarg.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/stat.h>
|
||||
#include <fcntl.h>
|
||||
#include "pam_sscs.h"
|
||||
|
||||
void pam_sscs_log(int priority, const char *format,...)
|
||||
{
|
||||
va_list args;
|
||||
char *mesg = NULL;
|
||||
|
||||
va_start( args,format );
|
||||
if( vasprintf( &mesg, format, args ) < 0 )
|
||||
return;
|
||||
syslog( priority,"pam_micasa: %s",mesg );
|
||||
va_end( args );
|
||||
}
|
||||
Reference in New Issue
Block a user