3 * Copyright (c) 2001 Gert Doering. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
40 extern ServerOptions options
;
41 extern Buffer loginmsg
;
43 # ifdef HAVE_SETAUTHDB
44 static char old_registry
[REGISTRY_SIZE
] = "";
48 * AIX has a "usrinfo" area where logname and other stuff is stored -
49 * a few applications actually use this and die if it's not set
51 * NOTE: TTY= should be set, but since no one uses it and it's hard to
52 * acquire due to privsep code. We will just drop support.
55 aix_usrinfo(struct passwd
*pw
)
61 len
= sizeof("LOGNAME= NAME= ") + (2 * strlen(pw
->pw_name
));
64 i
= snprintf(cp
, len
, "LOGNAME=%s%cNAME=%s%c", pw
->pw_name
, '\0',
66 if (usrinfo(SETUINFO
, cp
, i
) == -1)
67 fatal("Couldn't set usrinfo: %s", strerror(errno
));
68 debug3("AIX/UsrInfo: set len %d", i
);
73 # ifdef WITH_AIXAUTHENTICATE
75 * Remove embedded newlines in string (if any).
76 * Used before logging messages returned by AIX authentication functions
77 * so the message is logged on one line.
80 aix_remove_embedded_newlines(char *p
)
89 /* Remove trailing whitespace */
95 * Do authentication via AIX's authenticate routine. We loop until the
96 * reenter parameter is 0, but normally authenticate is called only once.
98 * Note: this function returns 1 on success, whereas AIX's authenticate()
102 sys_auth_passwd(Authctxt
*ctxt
, const char *password
)
104 char *authmsg
= NULL
, *host
, *msg
, *name
= ctxt
->pw
->pw_name
;
105 int authsuccess
= 0, expired
, reenter
, result
;
108 result
= authenticate((char *)name
, (char *)password
, &reenter
,
110 aix_remove_embedded_newlines(authmsg
);
111 debug3("AIX/authenticate result %d, msg %.100s", result
,
118 host
= (char *)get_canonical_hostname(options
.use_dns
);
121 * Record successful login. We don't have a pty yet, so just
122 * label the line as "ssh"
125 if (loginsuccess((char *)name
, (char *)host
, "ssh", &msg
) == 0) {
127 debug("%s: msg %s", __func__
, msg
);
128 buffer_append(&loginmsg
, msg
, strlen(msg
));
134 * Check if the user's password is expired.
136 expired
= passwdexpired(name
, &msg
);
138 buffer_append(&loginmsg
, msg
, strlen(msg
));
139 aix_remove_embedded_newlines(msg
);
141 debug3("AIX/passwdexpired returned %d msg %.100s", expired
, msg
);
144 case 0: /* password not expired */
146 case 1: /* expired, password change required */
147 ctxt
->force_pwchange
= 1;
148 disable_forwarding();
150 default: /* user can't change(2) or other error (-1) */
151 logit("Password can't be changed for user %s: %.100s",
167 # ifdef CUSTOM_FAILED_LOGIN
169 * record_failed_login: generic "login failed" interface function
172 record_failed_login(const char *user
, const char *ttyname
)
174 char *hostname
= (char *)get_canonical_hostname(options
.use_dns
);
180 # ifdef AIX_LOGINFAILED_4ARG
181 loginfailed((char *)user
, hostname
, (char *)ttyname
, AUDIT_FAIL_AUTH
);
183 loginfailed((char *)user
, hostname
, (char *)ttyname
);
187 # endif /* CUSTOM_FAILED_LOGIN */
190 * If we have setauthdb, retrieve the password registry for the user's
191 * account then feed it to setauthdb. This will mean that subsequent AIX auth
192 * functions will only use the specified loadable module. If we don't have
193 * setauthdb this is a no-op.
196 aix_setauthdb(const char *user
)
198 # ifdef HAVE_SETAUTHDB
201 if (setuserdb(S_READ
) == -1) {
202 debug3("%s: Could not open userdb to read", __func__
);
206 if (getuserattr((char *)user
, S_REGISTRY
, ®istry
, SEC_CHAR
) == 0) {
207 if (setauthdb(registry
, old_registry
) == 0)
208 debug3("AIX/setauthdb set registry '%s'", registry
);
210 debug3("AIX/setauthdb set registry '%s' failed: %s",
211 registry
, strerror(errno
));
213 debug3("%s: Could not read S_REGISTRY for user: %s", __func__
,
216 # endif /* HAVE_SETAUTHDB */
220 * Restore the user's registry settings from old_registry.
221 * Note that if the first aix_setauthdb fails, setauthdb("") is still safe
222 * (it restores the system default behaviour). If we don't have setauthdb,
226 aix_restoreauthdb(void)
228 # ifdef HAVE_SETAUTHDB
229 if (setauthdb(old_registry
, NULL
) == 0)
230 debug3("%s: restoring old registry '%s'", __func__
,
233 debug3("%s: failed to restore old registry %s", __func__
,
235 # endif /* HAVE_SETAUTHDB */
238 # endif /* WITH_AIXAUTHENTICATE */