summaryrefslogtreecommitdiff
path: root/svr-auth.c
diff options
context:
space:
mode:
authorstellarpower <stellarpower@googlemail.com>2018-02-20 02:11:55 +0000
committerstellarpower <stellarpower@googlemail.com>2018-02-20 02:11:55 +0000
commit5734ea3ad1008a3daa35cef17e1da58698a92c87 (patch)
tree6c6695c5ae76497055270550d8d80578dc6cbe38 /svr-auth.c
parent26984c5523656e832019c6c09e544ad08608dc36 (diff)
downloaddropbear-5734ea3ad1008a3daa35cef17e1da58698a92c87.tar.gz
Added the -G option to allow logins only for users that are members of a certain group. This allows finer control of an instance on who can and cannot login over a certain instance (e.g. password and not key). Needs double-checking and ensuring it meets platform requirements.
Diffstat (limited to 'svr-auth.c')
-rw-r--r--svr-auth.c46
1 files changed, 46 insertions, 0 deletions
diff --git a/svr-auth.c b/svr-auth.c
index 523f91b..9c818d9 100644
--- a/svr-auth.c
+++ b/svr-auth.c
@@ -25,6 +25,8 @@
/* This file (auth.c) handles authentication requests, passing it to the
* particular type (auth-passwd, auth-pubkey). */
+#include <limits.h>
+
#include "includes.h"
#include "dbutil.h"
#include "session.h"
@@ -232,6 +234,10 @@ static int checkusername(char *username, unsigned int userlen) {
char* listshell = NULL;
char* usershell = NULL;
uid_t uid;
+ int ngroups = 32, ret;
+ gid_t *grouplist;
+
+
TRACE(("enter checkusername"))
if (userlen > MAX_USERNAME_LEN) {
return DROPBEAR_FAILURE;
@@ -278,6 +284,46 @@ static int checkusername(char *username, unsigned int userlen) {
return DROPBEAR_FAILURE;
}
+ /* check for login restricted to certain group if desired */
+ if (svr_opts.grouploginid) {
+
+ for ( ; (ngroups <= NGROUPS_MAX) && (ngroups <= INT_MAX / 8); ngroups *= 2){
+
+ grouplist = malloc(sizeof(gid_t) * ngroups);
+
+ ret = getgrouplist(ses.authstate.pw_name, ses.authstate.pw_gid, grouplist, &ngroups);
+
+ if (ret != -1){
+ break;
+ }
+
+ free(grouplist);
+ ngroups *= 2;
+ }
+
+ if ((ngroups > NGROUPS_MAX / 8) || (ngroups > INT_MAX / 8)){
+
+ TRACE(("Cannot walk group structure for current user, too many groups"))
+ dropbear_log(LOG_ERR, "Cannot walk group structure for current user, too many groups");
+ return DROPBEAR_FAILURE;
+ }
+
+ ngroups = 0;
+ for (int i = 0; i < ret; i++){
+ if (grouplist[i] == *svr_opts.grouploginid){
+ ngroups = 1; //Just used as a flag to indicate success;
+ break;
+ }
+
+ }
+
+ if (!ngroups){
+ TRACE(("leave checkusername: user not in permitted group"))
+ dropbear_log(LOG_WARNING, "logins are restricted to the group %s but user %s is not a member", svr_opts.grouploginname, ses.authstate.pw_name);
+ return DROPBEAR_FAILURE;
+ }
+ }
+
TRACE(("shell is %s", ses.authstate.pw_shell))
/* check that the shell is set */