2006-11-26 11:13:41 -07:00
|
|
|
/*
|
|
|
|
|
|
|
|
Copyright 1988, 1998 The Open Group
|
|
|
|
|
|
|
|
Permission to use, copy, modify, distribute, and sell this software and its
|
|
|
|
documentation for any purpose is hereby granted without fee, provided that
|
|
|
|
the above copyright notice appear in all copies and that both that
|
|
|
|
copyright notice and this permission notice appear in supporting
|
|
|
|
documentation.
|
|
|
|
|
|
|
|
The above copyright notice and this permission notice shall be included
|
|
|
|
in all copies or substantial portions of the Software.
|
|
|
|
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
|
|
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
|
|
IN NO EVENT SHALL THE OPEN GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR
|
|
|
|
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
|
|
|
|
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
|
|
|
|
OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
|
|
|
|
Except as contained in this notice, the name of The Open Group shall
|
|
|
|
not be used in advertising or otherwise to promote the sale, use or
|
|
|
|
other dealings in this Software without prior written authorization
|
|
|
|
from The Open Group.
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* authorization hooks for the server
|
|
|
|
* Author: Keith Packard, MIT X Consortium
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_DIX_CONFIG_H
|
|
|
|
#include <dix-config.h>
|
|
|
|
#endif
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
#include <X11/X.h>
|
|
|
|
#include <X11/Xauth.h>
|
|
|
|
#include "misc.h"
|
|
|
|
#include "osdep.h"
|
|
|
|
#include "dixstruct.h"
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef WIN32
|
|
|
|
#include <X11/Xw32defs.h>
|
|
|
|
#endif
|
2017-02-28 11:27:40 -07:00
|
|
|
#ifdef HAVE_LIBBSD
|
|
|
|
#include <bsd/stdlib.h> /* for arc4random_buf() */
|
|
|
|
#endif
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
struct protocol {
|
2012-06-10 07:21:05 -06:00
|
|
|
unsigned short name_length;
|
|
|
|
const char *name;
|
|
|
|
AuthAddCFunc Add; /* new authorization data */
|
|
|
|
AuthCheckFunc Check; /* verify client authorization data */
|
|
|
|
AuthRstCFunc Reset; /* delete all authorization data entries */
|
|
|
|
AuthFromIDFunc FromID; /* convert ID to cookie */
|
|
|
|
AuthRemCFunc Remove; /* remove a specific cookie */
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef XCSECURITY
|
2012-06-10 07:21:05 -06:00
|
|
|
AuthGenCFunc Generate;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
static struct protocol protocols[] = {
|
|
|
|
{(unsigned short) 18, "MIT-MAGIC-COOKIE-1",
|
|
|
|
MitAddCookie, MitCheckCookie, MitResetCookie,
|
2017-02-28 11:32:53 -07:00
|
|
|
MitFromID, MitRemoveCookie,
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef XCSECURITY
|
2012-06-10 07:21:05 -06:00
|
|
|
MitGenerateCookie
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
},
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef HASXDMAUTH
|
2012-06-10 07:21:05 -06:00
|
|
|
{(unsigned short) 19, "XDM-AUTHORIZATION-1",
|
|
|
|
XdmAddCookie, XdmCheckCookie, XdmResetCookie,
|
2017-02-28 11:32:53 -07:00
|
|
|
XdmFromID, XdmRemoveCookie,
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef XCSECURITY
|
2012-06-10 07:21:05 -06:00
|
|
|
NULL
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
},
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef SECURE_RPC
|
2012-06-10 07:21:05 -06:00
|
|
|
{(unsigned short) 9, "SUN-DES-1",
|
|
|
|
SecureRPCAdd, SecureRPCCheck, SecureRPCReset,
|
2017-02-28 11:32:53 -07:00
|
|
|
SecureRPCFromID, SecureRPCRemove,
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef XCSECURITY
|
2012-06-10 07:21:05 -06:00
|
|
|
NULL
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
},
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
#define NUM_AUTHORIZATION (sizeof (protocols) /\
|
2006-11-26 11:13:41 -07:00
|
|
|
sizeof (struct protocol))
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initialize all classes of authorization by reading the
|
|
|
|
* specified authorization file
|
|
|
|
*/
|
|
|
|
|
2014-09-27 11:52:59 -06:00
|
|
|
static const char *authorization_file = NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
static Bool ShouldLoadAuth = TRUE;
|
|
|
|
|
|
|
|
void
|
2014-09-27 11:52:59 -06:00
|
|
|
InitAuthorization(const char *file_name)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
authorization_file = file_name;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2012-06-10 07:21:05 -06:00
|
|
|
LoadAuthorization(void)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
FILE *f;
|
|
|
|
Xauth *auth;
|
|
|
|
int i;
|
|
|
|
int count = 0;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
ShouldLoadAuth = FALSE;
|
|
|
|
if (!authorization_file)
|
2012-06-10 07:21:05 -06:00
|
|
|
return 0;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
f = Fopen(authorization_file, "r");
|
2006-11-26 11:13:41 -07:00
|
|
|
if (!f)
|
2012-06-10 07:21:05 -06:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
while ((auth = XauReadAuth(f)) != 0) {
|
|
|
|
for (i = 0; i < NUM_AUTHORIZATION; i++) {
|
|
|
|
if (protocols[i].name_length == auth->name_length &&
|
|
|
|
memcmp(protocols[i].name, auth->name,
|
|
|
|
(int) auth->name_length) == 0 && protocols[i].Add) {
|
|
|
|
++count;
|
|
|
|
(*protocols[i].Add) (auth->data_length, auth->data,
|
|
|
|
FakeClientID(0));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
XauDisposeAuth(auth);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
Fclose(f);
|
2006-11-26 11:13:41 -07:00
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef XDMCP
|
|
|
|
/*
|
|
|
|
* XdmcpInit calls this function to discover all authorization
|
|
|
|
* schemes supported by the display
|
|
|
|
*/
|
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
RegisterAuthorizations(void)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
int i;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_AUTHORIZATION; i++)
|
2012-06-10 07:21:05 -06:00
|
|
|
XdmcpRegisterAuthorization(protocols[i].name,
|
|
|
|
(int) protocols[i].name_length);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
XID
|
2012-06-10 07:21:05 -06:00
|
|
|
CheckAuthorization(unsigned int name_length,
|
|
|
|
const char *name,
|
|
|
|
unsigned int data_length,
|
|
|
|
const char *data, ClientPtr client, const char **reason)
|
|
|
|
{ /* failure message. NULL for default msg */
|
|
|
|
int i;
|
2006-11-26 11:13:41 -07:00
|
|
|
struct stat buf;
|
|
|
|
static time_t lastmod = 0;
|
|
|
|
static Bool loaded = FALSE;
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
if (!authorization_file || stat(authorization_file, &buf)) {
|
|
|
|
if (lastmod != 0) {
|
|
|
|
lastmod = 0;
|
|
|
|
ShouldLoadAuth = TRUE; /* stat lost, so force reload */
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2012-06-10 07:21:05 -06:00
|
|
|
else if (buf.st_mtime > lastmod) {
|
|
|
|
lastmod = buf.st_mtime;
|
|
|
|
ShouldLoadAuth = TRUE;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2012-06-10 07:21:05 -06:00
|
|
|
if (ShouldLoadAuth) {
|
|
|
|
int loadauth = LoadAuthorization();
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the authorization file has at least one entry for this server,
|
2015-09-16 13:10:19 -06:00
|
|
|
* disable local access. (loadauth > 0)
|
2012-06-10 07:21:05 -06:00
|
|
|
*
|
|
|
|
* If there are zero entries (either initially or when the
|
|
|
|
* authorization file is later reloaded), or if a valid
|
2015-09-16 13:10:19 -06:00
|
|
|
* authorization file was never loaded, enable local access.
|
2012-06-10 07:21:05 -06:00
|
|
|
* (loadauth == 0 || !loaded)
|
|
|
|
*
|
|
|
|
* If the authorization file was loaded initially (with valid
|
|
|
|
* entries for this server), and reloading it later fails, don't
|
|
|
|
* change anything. (loadauth == -1 && loaded)
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (loadauth > 0) {
|
2015-09-16 13:10:19 -06:00
|
|
|
DisableLocalAccess(); /* got at least one */
|
2012-06-10 07:21:05 -06:00
|
|
|
loaded = TRUE;
|
|
|
|
}
|
|
|
|
else if (loadauth == 0 || !loaded)
|
2015-09-16 13:10:19 -06:00
|
|
|
EnableLocalAccess();
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
if (name_length) {
|
2012-06-10 07:21:05 -06:00
|
|
|
for (i = 0; i < NUM_AUTHORIZATION; i++) {
|
|
|
|
if (protocols[i].name_length == name_length &&
|
|
|
|
memcmp(protocols[i].name, name, (int) name_length) == 0) {
|
|
|
|
return (*protocols[i].Check) (data_length, data, client,
|
|
|
|
reason);
|
|
|
|
}
|
|
|
|
*reason = "Protocol not supported by server\n";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
*reason = "No protocol specified\n";
|
2006-11-26 11:13:41 -07:00
|
|
|
return (XID) ~0L;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
ResetAuthorization(void)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
int i;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_AUTHORIZATION; i++)
|
2012-06-10 07:21:05 -06:00
|
|
|
if (protocols[i].Reset)
|
|
|
|
(*protocols[i].Reset) ();
|
2006-11-26 11:13:41 -07:00
|
|
|
ShouldLoadAuth = TRUE;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2012-06-10 07:21:05 -06:00
|
|
|
AuthorizationFromID(XID id,
|
|
|
|
unsigned short *name_lenp,
|
|
|
|
const char **namep, unsigned short *data_lenp, char **datap)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
int i;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_AUTHORIZATION; i++) {
|
2012-06-10 07:21:05 -06:00
|
|
|
if (protocols[i].FromID &&
|
|
|
|
(*protocols[i].FromID) (id, data_lenp, datap)) {
|
|
|
|
*name_lenp = protocols[i].name_length;
|
|
|
|
*namep = protocols[i].name;
|
|
|
|
return 1;
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2012-06-10 07:21:05 -06:00
|
|
|
RemoveAuthorization(unsigned short name_length,
|
|
|
|
const char *name,
|
|
|
|
unsigned short data_length, const char *data)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
int i;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_AUTHORIZATION; i++) {
|
2012-06-10 07:21:05 -06:00
|
|
|
if (protocols[i].name_length == name_length &&
|
|
|
|
memcmp(protocols[i].name, name, (int) name_length) == 0 &&
|
|
|
|
protocols[i].Remove) {
|
|
|
|
return (*protocols[i].Remove) (data_length, data);
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2012-06-10 07:21:05 -06:00
|
|
|
AddAuthorization(unsigned name_length, const char *name,
|
|
|
|
unsigned data_length, char *data)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
int i;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_AUTHORIZATION; i++) {
|
2012-06-10 07:21:05 -06:00
|
|
|
if (protocols[i].name_length == name_length &&
|
|
|
|
memcmp(protocols[i].name, name, (int) name_length) == 0 &&
|
|
|
|
protocols[i].Add) {
|
|
|
|
return (*protocols[i].Add) (data_length, data, FakeClientID(0));
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef XCSECURITY
|
|
|
|
|
|
|
|
XID
|
2012-06-10 07:21:05 -06:00
|
|
|
GenerateAuthorization(unsigned name_length,
|
|
|
|
const char *name,
|
|
|
|
unsigned data_length,
|
|
|
|
const char *data,
|
|
|
|
unsigned *data_length_return, char **data_return)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
int i;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
for (i = 0; i < NUM_AUTHORIZATION; i++) {
|
2012-06-10 07:21:05 -06:00
|
|
|
if (protocols[i].name_length == name_length &&
|
|
|
|
memcmp(protocols[i].name, name, (int) name_length) == 0 &&
|
|
|
|
protocols[i].Generate) {
|
|
|
|
return (*protocols[i].Generate) (data_length, data,
|
|
|
|
FakeClientID(0),
|
|
|
|
data_length_return, data_return);
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
GenerateRandomData(int len, char *buf)
|
2008-11-02 08:26:08 -07:00
|
|
|
{
|
2017-12-08 08:01:59 -07:00
|
|
|
#ifdef HAVE_ARC4RANDOM_BUF
|
|
|
|
arc4random_buf(buf, len);
|
|
|
|
#else
|
2008-11-02 08:26:08 -07:00
|
|
|
int fd;
|
|
|
|
|
|
|
|
fd = open("/dev/urandom", O_RDONLY);
|
|
|
|
read(fd, buf, len);
|
|
|
|
close(fd);
|
2017-02-28 11:27:40 -07:00
|
|
|
#endif
|
2008-11-02 08:26:08 -07:00
|
|
|
}
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
#endif /* XCSECURITY */
|