summaryrefslogtreecommitdiff
path: root/daemon/filecheck.c
diff options
context:
space:
mode:
Diffstat (limited to 'daemon/filecheck.c')
-rw-r--r--daemon/filecheck.c200
1 files changed, 0 insertions, 200 deletions
diff --git a/daemon/filecheck.c b/daemon/filecheck.c
deleted file mode 100644
index 5cf60066..00000000
--- a/daemon/filecheck.c
+++ /dev/null
@@ -1,200 +0,0 @@
-/* GDM - The GNOME Display Manager
- * Copyright (C) 1998, 1999, 2000 Martin K. Petersen <mkp@mkp.net>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
- */
-
-#include "config.h"
-
-#include <glib/gi18n.h>
-#include <syslog.h>
-#include <sys/stat.h>
-
-#include "gdm.h"
-#include "filecheck.h"
-#include "gdmconfig.h"
-
-/**
- * gdm_file_check:
- * @caller: String to be prepended to syslog error messages.
- * @user: User id for the user owning the file/dir.
- * @dir: Directory to be examined.
- * @file: File to be examined.
- * @absentok: Accept absent files if TRUE.
- * @absentdirok: Absent directory returns FALSE but without complaining
- * @maxsize: Maximum acceptable filesize in KB. 0 to disable.
- * @perms: 0 to allow user writable file/dir only. 1 to allow group and 2 to allow global writable file/dir.
- *
- * Examines a file to determine whether it is safe for the daemon to write to it.
- */
-
-/* we should be euid the user BTW */
-gboolean
-gdm_file_check (const gchar *caller, uid_t user, const gchar *dir,
- const gchar *file, gboolean absentok,
- gboolean absentdirok, gint maxsize, gint perms)
-{
- struct stat statbuf;
- gchar *fullpath;
- int r;
-
- if (ve_string_empty (dir) ||
- ve_string_empty (file))
- return FALSE;
-
- /* Stat directory */
- VE_IGNORE_EINTR (r = g_stat (dir, &statbuf));
- if (r < 0) {
- if ( ! absentdirok)
- syslog (LOG_WARNING, _("%s: Directory %s does not exist."),
- caller, dir);
- return FALSE;
- }
-
- /* Check if dir is owned by the user ...
- Only, if GDM_KEY_CHECK_DIR_OWNER is true (default)
- This is a "hack" for directories not owned by
- the user.
- 2004-06-22, Andreas Schubert, MATHEMA Software GmbH */
-
- if G_UNLIKELY (gdm_get_value_bool (GDM_KEY_CHECK_DIR_OWNER) && (statbuf.st_uid != user)) {
- syslog (LOG_WARNING, _("%s: %s is not owned by uid %d."), caller, dir, user);
- return FALSE;
- }
-
- /* ... if group has write permission ... */
- if G_UNLIKELY (perms < 1 && (statbuf.st_mode & S_IWGRP) == S_IWGRP) {
- syslog (LOG_WARNING, _("%s: %s is writable by group."), caller, dir);
- return FALSE;
- }
-
- /* ... and if others have write permission. */
- if G_UNLIKELY (perms < 2 && (statbuf.st_mode & S_IWOTH) == S_IWOTH) {
- syslog (LOG_WARNING, _("%s: %s is writable by other."), caller, dir);
- return FALSE;
- }
-
- fullpath = g_build_filename (dir, file, NULL);
-
- /* Stat file */
- VE_IGNORE_EINTR (r = g_stat (fullpath, &statbuf));
- if (r < 0) {
- /* Return true if file does not exist and that is ok */
- if (absentok) {
- g_free (fullpath);
- return TRUE;
- }
- else {
- syslog (LOG_WARNING, _("%s: %s does not exist but must exist."), caller, fullpath);
- g_free (fullpath);
- return FALSE;
- }
- }
-
- /* Check that it is a regular file ... */
- if G_UNLIKELY (! S_ISREG (statbuf.st_mode)) {
- syslog (LOG_WARNING, _("%s: %s is not a regular file."), caller, fullpath);
- g_free (fullpath);
- return FALSE;
- }
-
- /* ... owned by the user ... */
- if G_UNLIKELY (statbuf.st_uid != user) {
- syslog (LOG_WARNING, _("%s: %s is not owned by uid %d."), caller, fullpath, user);
- g_free (fullpath);
- return FALSE;
- }
-
- /* ... unwritable by group ... */
- if G_UNLIKELY (perms < 1 && (statbuf.st_mode & S_IWGRP) == S_IWGRP) {
- syslog (LOG_WARNING, _("%s: %s is writable by group."), caller, fullpath);
- g_free (fullpath);
- return FALSE;
- }
-
- /* ... unwritable by others ... */
- if G_UNLIKELY (perms < 2 && (statbuf.st_mode & S_IWOTH) == S_IWOTH) {
- syslog (LOG_WARNING, _("%s: %s is writable by group/other."), caller, fullpath);
- g_free (fullpath);
- return FALSE;
- }
-
- /* ... and smaller than sysadmin specified limit. */
- if G_UNLIKELY (maxsize && statbuf.st_size > maxsize) {
- syslog (LOG_WARNING, _("%s: %s is bigger than sysadmin specified maximum file size."),
- caller, fullpath);
- g_free (fullpath);
- return FALSE;
- }
-
- g_free (fullpath);
-
- /* Yeap, this file is ok */
- return TRUE;
-}
-
-/* we should be euid the user BTW */
-gboolean
-gdm_auth_file_check (const gchar *caller, uid_t user, const gchar *authfile, gboolean absentok, struct stat *s)
-{
- struct stat statbuf;
- gint usermaxfile;
- int r;
-
- if (ve_string_empty (authfile))
- return FALSE;
-
- /* Stat file */
- VE_IGNORE_EINTR (r = g_lstat (authfile, &statbuf));
- if (s != NULL)
- *s = statbuf;
- if (r < 0) {
- if (absentok)
- return TRUE;
- syslog (LOG_WARNING, _("%s: %s does not exist but must exist."), caller, authfile);
- return FALSE;
- }
-
- /* Check that it is a regular file ... */
- if G_UNLIKELY (! S_ISREG (statbuf.st_mode)) {
- syslog (LOG_WARNING, _("%s: %s is not a regular file."), caller, authfile);
- return FALSE;
- }
-
- /* ... owned by the user ... */
- if G_UNLIKELY (statbuf.st_uid != user) {
- syslog (LOG_WARNING, _("%s: %s is not owned by uid %d."), caller, authfile, user);
- return FALSE;
- }
-
- /* ... has right permissions ... */
- if G_UNLIKELY (statbuf.st_mode & 0077) {
- syslog (LOG_WARNING, "%s: %s has wrong permissions (should be 0600)", caller, authfile);
- return FALSE;
- }
-
- usermaxfile = gdm_get_value_int (GDM_KEY_USER_MAX_FILE);
- /* ... and smaller than sysadmin specified limit. */
- if G_UNLIKELY (usermaxfile && statbuf.st_size > usermaxfile) {
- syslog (LOG_WARNING, _("%s: %s is bigger than sysadmin specified maximum file size."),
- caller, authfile);
- return FALSE;
- }
-
- /* Yeap, this file is ok */
- return TRUE;
-}
-
-/* EOF */