/* Authentication server. Copyright (C) 1996,97,98,99,2002 Free Software Foundation, Inc. Written by Roland McGrath. This file is part of the GNU Hurd. The GNU Hurd is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2, or (at your option) any later version. The GNU Hurd is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "auth_S.h" #include "auth_reply_U.h" #include "auth.h" const char *argp_program_version = STANDARD_HURD_VERSION(auth); /* Auth handles are server ports with sets of ids. */ struct authhandle { struct port_info pi; struct idvec euids, egids, auids, agids; }; struct port_bucket *auth_bucket; struct port_class *authhandle_portclass; /* Create a new auth port. */ static error_t create_authhandle (struct authhandle **new) { error_t err = ports_create_port (authhandle_portclass, auth_bucket, sizeof **new, new); if (! err) memset (&(*new)->euids, 0, (void *)&(*new)[1] - (void *)&(*new)->euids); return err; } /* Clean up a dead auth port. */ static void destroy_authhandle (void *p) { struct authhandle *h = p; idvec_free_contents (&h->euids); idvec_free_contents (&h->egids); idvec_free_contents (&h->auids); idvec_free_contents (&h->agids); } /* id management. */ static inline void idvec_copyout (struct idvec *idvec, uid_t **ids, size_t *nids) { if (idvec->num > *nids) *ids = idvec->ids; else memcpy (*ids, idvec->ids, idvec->num * sizeof *ids); *nids = idvec->num; } #define C(auth, ids) idvec_copyout (&auth->ids, ids, n##ids) #define OUTIDS(auth) (C (auth, euids), C (auth, egids), \ C (auth, auids), C (auth, agids)) /* Implement auth_getids as described in . */ kern_return_t S_auth_getids (struct authhandle *auth, uid_t **euids, size_t *neuids, uid_t **auids, size_t *nauids, uid_t **egids, size_t *negids, uid_t **agids, size_t *nagids) { if (! auth) return EOPNOTSUPP; OUTIDS (auth); return 0; } /* Implement auth_makeauth as described in . */ kern_return_t S_auth_makeauth (struct authhandle *auth, mach_port_t *authpts, size_t nauths, uid_t *euids, size_t neuids, uid_t *auids, size_t nauids, uid_t *egids, size_t negids, uid_t *agids, size_t nagids, mach_port_t *newhandle) { struct authhandle *newauth, *auths[1 + nauths]; int hasroot = 0; error_t err; size_t i, j; if (!auth) return EOPNOTSUPP; auths[0] = auth; /* Fetch the auth structures for all the ports passed in. */ for (i = 0; i < nauths; i++) auths[i + 1] = auth_port_to_handle (authpts[i]); ++nauths; /* Verify that the union of the handles passed in either contains euid 0 (root), or contains all the requested ids. */ #define isuid(uid, auth) \ (idvec_contains (&(auth)->euids, uid) \ || idvec_contains (&(auth)->auids, uid)) #define groupmember(gid, auth) \ (idvec_contains (&(auth)->egids, gid) \ || idvec_contains (&(auth)->agids, gid)) #define isroot(auth) isuid (0, auth) for (i = 0; i < nauths; i++) if (auths[i] && isroot (auths[i])) { hasroot = 1; break; } if (!hasroot) { int has_it; for (i = 0; i < neuids; i++) { has_it = 0; for (j = 0; j < nauths; j++) if (auths[j] && isuid (euids[i], auths[j])) { has_it = 1; break; } if (!has_it) goto eperm; } for (i = 0; i < nauids; i++) { has_it = 0; for (j = 0; j < nauths; j++) if (auths[j] && isuid (auids[i], auths[j])) { has_it = 1; break; } if (!has_it) goto eperm; } for (i = 0; i < negids; i++) { has_it = 0; for (j = 0; j < nauths; j++) if (auths[j] && groupmember (egids[i], auths[j])) { has_it = 1; break; } if (!has_it) goto eperm; } for (i = 0; i < nagids; i++) { has_it = 0; for (j = 0; j < nauths; j++) if (auths[j] && groupmember (agids[i], auths[j])) { has_it = 1; break; } if (!has_it) goto eperm; } } err = create_authhandle (&newauth); /* Create a new handle with the specified ids. */ #define MERGE S (euids); S (egids); S (auids); S (agids); #define S(uids) if (!err) err = idvec_merge_ids (&newauth->uids, uids, n##uids) MERGE; #undef S if (! err) { for (j = 1; j < nauths; ++j) mach_port_deallocate (mach_task_self (), authpts[j - 1]); *newhandle = ports_get_right (newauth); ports_port_deref (newauth); } for (j = 1; j < nauths; j++) if (auths[j]) ports_port_deref (auths[j]); return err; eperm: for (j = 1; j < nauths; j++) if (auths[j]) ports_port_deref (auths[j]); return EPERM; } /* Transaction handling. */ /* Since the user is responsible for freeing the rendezvous port, it has to * wait for the server to have finished transmitting uids. * * The server thus waits for the user to give it uids (unless it was already * there), transmits them and provides the passthrough port. * * The user gives the uids and waits for the passthrough port from the server. * * If the user is early, it has to tell the server it arrived. */ /* A pending user. */ struct pending_user { hurd_ihash_locp_t locp; /* Position in the pending_users ihash table. */ pthread_cond_t wakeup; /* The reader is blocked on this condition. */ /* The user's auth handle. */ struct authhandle *user; /* The port to pass back to the user. */ mach_port_t passthrough; }; /* A pending server. */ struct pending_server { hurd_ihash_locp_t locp; /* Position in the pending_servers ihash table. */ pthread_cond_t wakeup; /* The server is blocked on this condition. */ }; /* Table of pending transactions keyed on RENDEZVOUS. */ struct hurd_ihash pending_users = HURD_IHASH_INITIALIZER (offsetof (struct pending_user, locp)); struct hurd_ihash pending_servers = HURD_IHASH_INITIALIZER (offsetof (struct pending_server, locp)); pthread_mutex_t pending_lock = PTHREAD_MUTEX_INITIALIZER; /* Implement auth_user_authenticate as described in . */ kern_return_t S_auth_user_authenticate (struct authhandle *userauth, mach_port_t reply, mach_msg_type_name_t reply_type, mach_port_t rendezvous, mach_port_t *newport, mach_msg_type_name_t *newporttype) { struct pending_server *s; struct pending_user u; error_t err; if (! userauth) return EOPNOTSUPP; if (! MACH_PORT_VALID (rendezvous)) return EINVAL; u.user = userauth; pthread_cond_init (&u.wakeup, NULL); pthread_mutex_lock (&pending_lock); err = hurd_ihash_add (&pending_users, rendezvous, &u); if (err) { pthread_mutex_unlock (&pending_lock); return err; } /* Give the server the auth port. We need to add a ref in case the port dies. */ ports_port_ref (userauth); /* Look for this rendezvous in the server list. */ s = hurd_ihash_find (&pending_servers, rendezvous); if (s) { /* Found it! */ /* Remove it from the pending list. */ hurd_ihash_locp_remove (&pending_servers, s->locp); /* Tell it we eventually arrived. */ pthread_cond_signal (&s->wakeup); } ports_interrupt_self_on_port_death (userauth, rendezvous); /* Wait for server answer. */ if (pthread_hurd_cond_wait_np (&u.wakeup, &pending_lock) && hurd_ihash_find (&pending_users, rendezvous)) /* We were interrupted; remove our record. */ { hurd_ihash_locp_remove (&pending_users, u.locp); /* Was it a normal interruption or did RENDEZVOUS die? */ mach_port_type_t type; mach_port_type (mach_task_self (), rendezvous, &type); err = type & MACH_PORT_TYPE_DEAD_NAME ? EINVAL : EINTR; } pthread_mutex_unlock (&pending_lock); if (! err) { /* Extract the port. */ *newport = u.passthrough; *newporttype = MACH_MSG_TYPE_MOVE_SEND; mach_port_deallocate (mach_task_self (), rendezvous); } return err; } /* Implement auth_server_authenticate as described in . */ kern_return_t S_auth_server_authenticate (struct authhandle *serverauth, mach_port_t reply, mach_msg_type_name_t reply_type, mach_port_t rendezvous, mach_port_t newport, mach_msg_type_name_t newport_type, uid_t **euids, size_t *neuids, uid_t **auids, size_t *nauids, uid_t **egids, size_t *negids, uid_t **agids, size_t *nagids) { struct pending_user *u; struct authhandle *user; error_t err = 0; if (! serverauth) return EOPNOTSUPP; if (! MACH_PORT_VALID (rendezvous)) return EINVAL; pthread_mutex_lock (&pending_lock); /* Look for this rendezvous in the user list. */ u = hurd_ihash_find (&pending_users, rendezvous); if (! u) { /* User not here yet, have to wait for it. */ struct pending_server s; pthread_cond_init (&s.wakeup, NULL); err = hurd_ihash_add (&pending_servers, rendezvous, &s); if (! err) { ports_interrupt_self_on_port_death (serverauth, rendezvous); if (pthread_hurd_cond_wait_np (&s.wakeup, &pending_lock) && hurd_ihash_find (&pending_servers, rendezvous)) /* We were interrupted; remove our record. */ { hurd_ihash_locp_remove (&pending_servers, s.locp); /* Was it a normal interruption or did RENDEZVOUS die? */ mach_port_type_t type; mach_port_type (mach_task_self (), rendezvous, &type); err = type & MACH_PORT_TYPE_DEAD_NAME ? EINVAL : EINTR; } else { u = hurd_ihash_find (&pending_users, rendezvous); if (! u) /* User still not here, odd! */ err = EINTR; } } } if (u) { error_t err2; /* Remove it from the pending list. */ hurd_ihash_locp_remove (&pending_users, u->locp); /* Found it! */ user = u->user; pthread_mutex_unlock (&pending_lock); /* Tell third party. */ err2 = auth_server_authenticate_reply (reply, reply_type, 0, user->euids.ids, user->euids.num, user->auids.ids, user->auids.num, user->egids.ids, user->egids.num, user->agids.ids, user->agids.num); if (err2) mach_port_deallocate (mach_task_self (), reply); pthread_mutex_lock (&pending_lock); /* Give the user the new port and wake the RPC up. */ u->passthrough = newport; pthread_cond_signal (&u->wakeup); } pthread_mutex_unlock (&pending_lock); if (err) return err; ports_port_deref (user); mach_port_deallocate (mach_task_self (), rendezvous); return MIG_NO_REPLY; } #include "../libports/notify_S.h" #include "../libports/interrupt_S.h" static int auth_demuxer (mach_msg_header_t *inp, mach_msg_header_t *outp) { mig_routine_t routine; if ((routine = auth_server_routine (inp)) || (routine = ports_interrupt_server_routine (inp)) || (routine = ports_notify_server_routine (inp))) { (*routine) (inp, outp); return TRUE; } else return FALSE; } int main (int argc, char **argv) { error_t err; mach_port_t boot; mach_port_t startup; process_t proc; mach_port_t hostpriv, masterdev; struct authhandle *firstauth; struct argp argp = { 0, 0, 0, "Hurd standard authentication server." }; argp_parse (&argp, argc, argv, 0, 0, 0); auth_bucket = ports_create_bucket (); authhandle_portclass = ports_create_class (&destroy_authhandle, 0); /* Create the initial root auth handle. */ err = create_authhandle (&firstauth); assert_perror (err); idvec_add (&firstauth->euids, 0); idvec_add (&firstauth->auids, 0); idvec_add (&firstauth->auids, 0); idvec_merge (&firstauth->egids, &firstauth->euids); idvec_merge (&firstauth->agids, &firstauth->auids); /* Fetch our bootstrap port and contact the bootstrap filesystem. */ err = task_get_bootstrap_port (mach_task_self (), &boot); assert_perror (err); if (boot == MACH_PORT_NULL) error (2, 0, "auth server can only be run by init during boot"); err = startup_authinit (boot, ports_get_right (firstauth), MACH_MSG_TYPE_MAKE_SEND, &proc); if (err) error (2, err, "cannot contact init for bootstrap"); /* Register ourselves with the proc server and then start signals. */ proc_getprivports (proc, &hostpriv, &masterdev); proc_register_version (proc, hostpriv, "auth", "", HURD_VERSION); mach_port_deallocate (mach_task_self (), masterdev); _hurd_port_set (&_hurd_ports[INIT_PORT_PROC], proc); _hurd_proc_init (argv, NULL, 0); startup = file_name_lookup (_SERVERS_STARTUP, 0, 0); if (! MACH_PORT_VALID (startup)) { error (0, errno, "%s", _SERVERS_STARTUP); /* Fall back to using the bootstrap port as before. */ startup = boot; } /* Init knows intimately that we will be ready for messages as soon as this returns. */ startup_essential_task (startup, mach_task_self (), MACH_PORT_NULL, "auth", hostpriv); if (startup != boot) mach_port_deallocate (mach_task_self (), startup); mach_port_deallocate (mach_task_self (), boot); mach_port_deallocate (mach_task_self (), hostpriv); /* Be a server. */ while (1) ports_manage_port_operations_multithread (auth_bucket, auth_demuxer, 30 * 1000, 0, 0); }