wok-6.x rev 11352
busybox/httpd: add support for system passwords
author | Pascal Bellard <pascal.bellard@slitaz.org> |
---|---|
date | Tue Nov 29 18:11:22 2011 +0100 (2011-11-29) |
parents | 05ee700100bf |
children | c2af9b1a616f |
files | busybox/receipt busybox/stuff/busybox-1.18-httpd.u |
line diff
1.1 --- a/busybox/receipt Tue Nov 29 11:53:47 2011 +0000 1.2 +++ b/busybox/receipt Tue Nov 29 18:11:22 2011 +0100 1.3 @@ -28,6 +28,7 @@ 1.4 printable.u 1.5 cmdline.u 1.6 conspy.u 1.7 +httpd.u 1.8 EOT 1.9 cp $stuff/$PACKAGE-${VERSION%.*}.config .config 1.10 }
2.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 2.2 +++ b/busybox/stuff/busybox-1.18-httpd.u Tue Nov 29 18:11:22 2011 +0100 2.3 @@ -0,0 +1,218 @@ 2.4 +Add support for system passwords 2.5 +--- busybox-1.18.2/networking/httpd.c 2.6 ++++ busybox-1.18.2/networking/httpd.c 2.7 +@@ -53,6 +53,8 @@ 2.8 + * /cgi-bin:foo:bar # Require user foo, pwd bar on urls starting with /cgi-bin/ 2.9 + * /adm:admin:setup # Require user admin, pwd setup on urls starting with /adm/ 2.10 + * /adm:toor:PaSsWd # or user toor, pwd PaSsWd on urls starting with /adm/ 2.11 ++ * /adm:root:* # or user root, pwd from /etc/passwd on urls starting with /adm/ 2.12 ++ * /wiki:*:* # or any user from /etc/passwd with according pwd on urls starting with /wiki/ 2.13 + * .au:audio/basic # additional mime type for audio.au files 2.14 + * *.php:/path/php # running cgi.php scripts through an interpreter 2.15 + * 2.16 +@@ -96,6 +98,14 @@ 2.17 + */ 2.18 + 2.19 + #include "libbb.h" 2.20 ++#if ENABLE_PAM 2.21 ++/* PAM may include <locale.h>. We may need to undefine bbox's stub define: */ 2.22 ++# undef setlocale 2.23 ++/* For some obscure reason, PAM is not in pam/xxx, but in security/xxx. 2.24 ++ * Apparently they like to confuse people. */ 2.25 ++# include <security/pam_appl.h> 2.26 ++# include <security/pam_misc.h> 2.27 ++#endif 2.28 + #if ENABLE_FEATURE_HTTPD_USE_SENDFILE 2.29 + #include <sys/sendfile.h> 2.30 + #endif 2.31 +@@ -1663,6 +1673,56 @@ 2.32 + } 2.33 + 2.34 + #if ENABLE_FEATURE_HTTPD_BASIC_AUTH 2.35 ++ 2.36 ++# if ENABLE_FEATURE_HTTPD_AUTH_MD5 && ENABLE_PAM 2.37 ++struct pam_userinfo { 2.38 ++ const char *name; 2.39 ++ const char *pw; 2.40 ++}; 2.41 ++ 2.42 ++static int pam_talker(int num_msg, 2.43 ++ const struct pam_message **msg, 2.44 ++ struct pam_response **resp, 2.45 ++ void *appdata_ptr) 2.46 ++{ 2.47 ++ int i; 2.48 ++ struct pam_userinfo *userinfo = (struct pam_userinfo *) appdata_ptr; 2.49 ++ struct pam_response *response; 2.50 ++ 2.51 ++ if (!resp || !msg || !userinfo) 2.52 ++ return PAM_CONV_ERR; 2.53 ++ 2.54 ++ /* allocate memory to store response */ 2.55 ++ response = xzalloc(num_msg * sizeof(*response)); 2.56 ++ 2.57 ++ /* copy values */ 2.58 ++ for (i = 0; i < num_msg; i++) { 2.59 ++ const char *s; 2.60 ++ 2.61 ++ switch (msg[i]->msg_style) { 2.62 ++ case PAM_PROMPT_ECHO_ON: 2.63 ++ s = userinfo->name; 2.64 ++ break; 2.65 ++ case PAM_PROMPT_ECHO_OFF: 2.66 ++ s = userinfo->pw; 2.67 ++ break; 2.68 ++ case PAM_ERROR_MSG: 2.69 ++ case PAM_TEXT_INFO: 2.70 ++ s = ""; 2.71 ++ break; 2.72 ++ default: 2.73 ++ free(response); 2.74 ++ return PAM_CONV_ERR; 2.75 ++ } 2.76 ++ response[i].resp = xstrdup(s); 2.77 ++ if (PAM_SUCCESS != 0) 2.78 ++ response[i].resp_retcode = PAM_SUCCESS; 2.79 ++ } 2.80 ++ *resp = response; 2.81 ++ return PAM_SUCCESS; 2.82 ++} 2.83 ++# endif 2.84 ++ 2.85 + /* 2.86 + * Config file entries are of the form "/<path>:<user>:<passwd>". 2.87 + * If config file has no prefix match for path, access is allowed. 2.88 +@@ -1672,7 +1732,7 @@ 2.89 + * 2.90 + * Returns 1 if user_and_passwd is OK. 2.91 + */ 2.92 +-static int check_user_passwd(const char *path, const char *user_and_passwd) 2.93 ++static int check_user_passwd(const char *path, char *user_and_passwd) 2.94 + { 2.95 + Htaccess *cur; 2.96 + const char *prev = NULL; 2.97 +@@ -1680,6 +1740,7 @@ 2.98 + for (cur = g_auth; cur; cur = cur->next) { 2.99 + const char *dir_prefix; 2.100 + size_t len; 2.101 ++ int r; 2.102 + 2.103 + dir_prefix = cur->before_colon; 2.104 + 2.105 +@@ -1704,36 +1765,96 @@ 2.106 + prev = dir_prefix; 2.107 + 2.108 + if (ENABLE_FEATURE_HTTPD_AUTH_MD5) { 2.109 +- char *md5_passwd; 2.110 ++ char *colon_after_user; 2.111 ++ const char *passwd; 2.112 ++# if ENABLE_FEATURE_SHADOWPASSWDS && !ENABLE_PAM 2.113 ++ char buffer[256]; /* will store passwd */ 2.114 ++# endif 2.115 + 2.116 +- md5_passwd = strchr(cur->after_colon, ':'); 2.117 +- if (md5_passwd && md5_passwd[1] == '$' && md5_passwd[2] == '1' 2.118 +- && md5_passwd[3] == '$' && md5_passwd[4] 2.119 +- ) { 2.120 +- char *encrypted; 2.121 +- int r, user_len_p1; 2.122 ++ colon_after_user = strchr(user_and_passwd, ':'); 2.123 ++ if (!colon_after_user) 2.124 ++ goto bad_input; 2.125 ++ passwd = strchr(cur->after_colon, ':'); 2.126 ++ if (!passwd) 2.127 ++ goto bad_input; 2.128 ++ passwd++; 2.129 ++ if (passwd[0] == '*') { 2.130 ++# if ENABLE_PAM 2.131 ++ struct pam_userinfo userinfo; 2.132 ++ struct pam_conv conv_info = { &pam_talker, (void *) &userinfo }; 2.133 ++ pam_handle_t *pamh; 2.134 + 2.135 +- md5_passwd++; 2.136 +- user_len_p1 = md5_passwd - cur->after_colon; 2.137 +- /* comparing "user:" */ 2.138 +- if (strncmp(cur->after_colon, user_and_passwd, user_len_p1) != 0) { 2.139 ++ /* compare "user:" */ 2.140 ++ if (cur->after_colon[0] != '*' 2.141 ++ && strncmp(cur->after_colon, user_and_passwd, colon_after_user - user_and_passwd + 1) != 0 2.142 ++ ) { 2.143 + continue; 2.144 + } 2.145 ++ /* this cfg entry is '*' or matches username from peer */ 2.146 ++ *colon_after_user = '\0'; 2.147 ++ userinfo.name = user_and_passwd; 2.148 ++ userinfo.pw = colon_after_user + 1; 2.149 ++ r = pam_start("httpd", user_and_passwd, &conv_info, &pamh) != PAM_SUCCESS; 2.150 ++ if (r == 0) { 2.151 ++ r = pam_authenticate(pamh, PAM_DISALLOW_NULL_AUTHTOK) != PAM_SUCCESS 2.152 ++ || pam_acct_mgmt(pamh, PAM_DISALLOW_NULL_AUTHTOK) != PAM_SUCCESS 2.153 ++ ; 2.154 ++ pam_end(pamh, PAM_SUCCESS); 2.155 ++ } 2.156 ++ *colon_after_user = ':'; 2.157 ++ goto end_check_passwd; 2.158 ++# else 2.159 ++# if ENABLE_FEATURE_SHADOWPASSWDS 2.160 ++ /* Using _r function to avoid pulling in static buffers */ 2.161 ++ struct spwd spw; 2.162 ++# endif 2.163 ++ struct passwd *pw; 2.164 + 2.165 +- encrypted = pw_encrypt( 2.166 +- user_and_passwd + user_len_p1 /* cleartext pwd from user */, 2.167 +- md5_passwd /*salt */, 1 /* cleanup */); 2.168 +- r = strcmp(encrypted, md5_passwd); 2.169 +- free(encrypted); 2.170 +- if (r == 0) 2.171 +- goto set_remoteuser_var; /* Ok */ 2.172 ++ *colon_after_user = '\0'; 2.173 ++ pw = getpwnam(user_and_passwd); 2.174 ++ *colon_after_user = ':'; 2.175 ++ if (!pw || !pw->pw_passwd) 2.176 ++ continue; 2.177 ++ passwd = pw->pw_passwd; 2.178 ++# if ENABLE_FEATURE_SHADOWPASSWDS 2.179 ++ if ((passwd[0] == 'x' || passwd[0] == '*') && !passwd[1]) { 2.180 ++ /* getspnam_r may return 0 yet set result to NULL. 2.181 ++ * At least glibc 2.4 does this. Be extra paranoid here. */ 2.182 ++ struct spwd *result = NULL; 2.183 ++ r = getspnam_r(pw->pw_name, &spw, buffer, sizeof(buffer), &result); 2.184 ++ if (r == 0 && result) 2.185 ++ passwd = result->sp_pwdp; /* note: passwd is located into buffer ! */ 2.186 ++ } 2.187 ++# endif 2.188 ++# endif /* ENABLE_PAM */ 2.189 ++ } 2.190 ++ 2.191 ++ /* compare "user:" */ 2.192 ++ if (cur->after_colon[0] != '*' 2.193 ++ && strncmp(cur->after_colon, user_and_passwd, colon_after_user - user_and_passwd + 1) != 0 2.194 ++ ) { 2.195 + continue; 2.196 + } 2.197 ++ /* this cfg entry is '*' or matches username from peer */ 2.198 ++ 2.199 ++ /* encrypt pwd from peer and check match with local one */ 2.200 ++ { 2.201 ++ char *encrypted = pw_encrypt( 2.202 ++ /* pwd: */ colon_after_user + 1, 2.203 ++ /* salt: */ passwd, 2.204 ++ /* cleanup: */ 0 2.205 ++ ); 2.206 ++ r = strcmp(encrypted, passwd); 2.207 ++ free(encrypted); 2.208 ++ goto end_check_passwd; 2.209 ++ } 2.210 ++ bad_input: ; 2.211 + } 2.212 + 2.213 + /* Comparing plaintext "user:pass" in one go */ 2.214 +- if (strcmp(cur->after_colon, user_and_passwd) == 0) { 2.215 +- set_remoteuser_var: 2.216 ++ end_check_passwd: 2.217 ++ r = strcmp(cur->after_colon, user_and_passwd); 2.218 ++ if (r == 0) { 2.219 + remoteuser = xstrndup(user_and_passwd, 2.220 + strchrnul(user_and_passwd, ':') - user_and_passwd); 2.221 + return 1; /* Ok */