xref: /dragonfly/usr.bin/chpass/chpass.c (revision 9348a738)
1 /*-
2  * Copyright (c) 1988, 1993, 1994
3  *	The Regents of the University of California.  All rights reserved.
4  * Copyright (c) 2002 Networks Associates Technology, Inc.
5  * All rights reserved.
6  *
7  * Portions of this software were developed for the FreeBSD Project by
8  * ThinkSec AS and NAI Labs, the Security Research Division of Network
9  * Associates, Inc.  under DARPA/SPAWAR contract N66001-01-C-8035
10  * ("CBOSS"), as part of the DARPA CHATS research program.
11  *
12  * Redistribution and use in source and binary forms, with or without
13  * modification, are permitted provided that the following conditions
14  * are met:
15  * 1. Redistributions of source code must retain the above copyright
16  *    notice, this list of conditions and the following disclaimer.
17  * 2. Redistributions in binary form must reproduce the above copyright
18  *    notice, this list of conditions and the following disclaimer in the
19  *    documentation and/or other materials provided with the distribution.
20  * 3. Neither the name of the University nor the names of its contributors
21  *    may be used to endorse or promote products derived from this software
22  *    without specific prior written permission.
23  *
24  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34  * SUCH DAMAGE.
35  *
36  * @(#) Copyright (c) 1988, 1993, 1994 The Regents of the University of California.  All rights reserved.
37  * @(#)chpass.c	8.4 (Berkeley) 4/2/94
38  * $FreeBSD: src/usr.bin/chpass/chpass.c,v 1.28 2006/09/25 15:06:24 marck Exp $
39  * $DragonFly: src/usr.bin/chpass/chpass.c,v 1.4 2003/11/03 19:31:28 eirikn Exp $
40  */
41 
42 #include <sys/param.h>
43 
44 #include <err.h>
45 #include <errno.h>
46 #include <pwd.h>
47 #include <stdio.h>
48 #include <stdlib.h>
49 #include <string.h>
50 #include <unistd.h>
51 #ifdef YP
52 #include <ypclnt.h>
53 #endif
54 
55 #include <pw_scan.h>
56 #include <libutil.h>
57 
58 #include "chpass.h"
59 
60 int master_mode;
61 
62 static void	baduser(void);
63 static void	usage(void);
64 
65 int
66 main(int argc, char **argv)
67 {
68 	enum { NEWSH, LOADENTRY, EDITENTRY, NEWPW, NEWEXP } op;
69 	struct passwd lpw, *old_pw, *pw;
70 	int ch, pfd, tfd;
71 	const char *password;
72 	char *cryptpw;
73 	char *arg = NULL;
74 	uid_t uid;
75 #ifdef YP
76 	struct ypclnt *ypclnt;
77 	const char *yp_domain = NULL, *yp_host = NULL;
78 #endif
79 
80 	pw = old_pw = NULL;
81 	op = EDITENTRY;
82 #ifdef YP
83 	while ((ch = getopt(argc, argv, "a:p:s:e:d:h:loy")) != -1)
84 #else
85 	while ((ch = getopt(argc, argv, "a:p:s:e:")) != -1)
86 #endif
87 		switch (ch) {
88 		case 'a':
89 			op = LOADENTRY;
90 			arg = optarg;
91 			break;
92 		case 's':
93 			op = NEWSH;
94 			arg = optarg;
95 			break;
96 		case 'p':
97 			op = NEWPW;
98 			arg = optarg;
99 			break;
100 		case 'e':
101 			op = NEWEXP;
102 			arg = optarg;
103 			break;
104 #ifdef YP
105 		case 'd':
106 			yp_domain = optarg;
107 			break;
108 		case 'h':
109 			yp_host = optarg;
110 			break;
111 		case 'l':
112 		case 'o':
113 		case 'y':
114 			/* compatibility */
115 			break;
116 #endif
117 		case '?':
118 		default:
119 			usage();
120 		}
121 
122 	argc -= optind;
123 	argv += optind;
124 
125 	if (argc > 1)
126 		usage();
127 
128 	uid = getuid();
129 
130 	if (op == EDITENTRY || op == NEWSH || op == NEWPW || op == NEWEXP) {
131 		if (argc == 0) {
132 			if ((pw = getpwuid(uid)) == NULL)
133 				errx(1, "unknown user: uid %lu",
134 				    (unsigned long)uid);
135 		} else {
136 			if ((pw = getpwnam(*argv)) == NULL)
137 				errx(1, "unknown user: %s", *argv);
138 			if (uid != 0 && uid != pw->pw_uid)
139 				baduser();
140 		}
141 
142 		/* Make a copy for later verification */
143 		if ((pw = pw_dup(pw)) == NULL ||
144 		    (old_pw = pw_dup(pw)) == NULL)
145 			err(1, "pw_dup");
146 	}
147 
148 #ifdef YP
149 	if (pw != NULL && (pw->pw_fields & _PWF_SOURCE) == _PWF_NIS) {
150 		ypclnt = ypclnt_new(yp_domain, "passwd.byname", yp_host);
151 		master_mode = (ypclnt != NULL &&
152 		    ypclnt_connect(ypclnt) != -1 &&
153 		    ypclnt_havepasswdd(ypclnt) == 1);
154 		ypclnt_free(ypclnt);
155 	} else
156 #endif
157 	master_mode = (uid == 0);
158 
159 	if (op == NEWSH) {
160 		/* protect p_shell -- it thinks NULL is /bin/sh */
161 		if (!arg[0])
162 			usage();
163 		if (p_shell(arg, pw, NULL) == -1)
164 			exit(1);
165 	}
166 
167 	if (op == NEWEXP) {
168 		if (uid)	/* only root can change expire */
169 			baduser();
170 		if (p_expire(arg, pw, NULL) == -1)
171 			exit(1);
172 	}
173 
174 	if (op == LOADENTRY) {
175 		if (uid)
176 			baduser();
177 		pw = &lpw;
178 		old_pw = NULL;
179 		if (!__pw_scan(arg, pw, _PWSCAN_WARN|_PWSCAN_MASTER))
180 			exit(1);
181 	}
182 
183 	if (op == NEWPW) {
184 		if (uid)
185 			baduser();
186 
187 		if (strchr(arg, ':'))
188 			errx(1, "invalid format for password");
189 		pw->pw_passwd = arg;
190 	}
191 
192 	if (op == EDITENTRY) {
193 		/*
194 		 * We don't really need pw_*() here, but pw_edit() (used
195 		 * by edit()) is just too useful...
196 		 */
197 		if (pw_init(NULL, NULL))
198 			err(1, "pw_init()");
199 		if ((tfd = pw_tmp(-1)) == -1) {
200 			pw_fini();
201 			err(1, "pw_tmp()");
202 		}
203 		free(pw);
204 		pw = edit(pw_tempname(), old_pw);
205 		pw_fini();
206 		if (pw == NULL)
207 			err(1, "edit()");
208 		/*
209 		 * pw_equal does not check for crypted passwords, so we
210 		 * should do it explicitly
211 		 */
212 		if (pw_equal(old_pw, pw) &&
213 		    strcmp(old_pw->pw_passwd, pw->pw_passwd) == 0)
214 			errx(0, "user information unchanged");
215 	}
216 
217 	if (old_pw && !master_mode) {
218 		password = getpass("Password: ");
219 		cryptpw = crypt(password, old_pw->pw_passwd);
220 		if (cryptpw == NULL || strcmp(cryptpw, old_pw->pw_passwd) != 0)
221 			baduser();
222 	} else {
223 		password = "";
224 	}
225 
226 	if (old_pw != NULL)
227 		pw->pw_fields |= (old_pw->pw_fields & _PWF_SOURCE);
228 	switch (pw->pw_fields & _PWF_SOURCE) {
229 #ifdef YP
230 	case _PWF_NIS:
231 		ypclnt = ypclnt_new(yp_domain, "passwd.byname", yp_host);
232 		if (ypclnt == NULL ||
233 		    ypclnt_connect(ypclnt) == -1 ||
234 		    ypclnt_passwd(ypclnt, pw, password) == -1) {
235 			warnx("%s", ypclnt->error);
236 			ypclnt_free(ypclnt);
237 			exit(1);
238 		}
239 		ypclnt_free(ypclnt);
240 		errx(0, "NIS user information updated");
241 #endif /* YP */
242 	case 0:
243 	case _PWF_FILES:
244 		if (pw_init(NULL, NULL))
245 			err(1, "pw_init()");
246 		if ((pfd = pw_lock()) == -1) {
247 			pw_fini();
248 			err(1, "pw_lock()");
249 		}
250 		if ((tfd = pw_tmp(-1)) == -1) {
251 			pw_fini();
252 			err(1, "pw_tmp()");
253 		}
254 		if (pw_copy(pfd, tfd, pw, old_pw) == -1) {
255 			pw_fini();
256 			err(1, "pw_copy");
257 		}
258 		if (pw_mkdb(pw->pw_name) == -1) {
259 			pw_fini();
260 			err(1, "pw_mkdb()");
261 		}
262 		pw_fini();
263 		errx(0, "user information updated");
264 		break;
265 	default:
266 		errx(1, "unsupported passwd source");
267 	}
268 }
269 
270 static void
271 baduser(void)
272 {
273 
274 	errx(1, "%s", strerror(EACCES));
275 }
276 
277 static void
278 usage(void)
279 {
280 
281 	fprintf(stderr,
282 	    "usage: chpass%s %s [user]\n",
283 #ifdef YP
284 	    " [-d domain] [-h host]",
285 #else
286 	    "",
287 #endif
288 	    "[-a list] [-p encpass] [-s shell] [-e mmm dd yy]");
289 	exit(1);
290 }
291