| /* $Id: platform.c,v 1.10 2010/11/05 02:07:25 dtucker Exp $ */ |
| |
| /* |
| * Copyright (c) 2006 Darren Tucker. All rights reserved. |
| * |
| * Permission to use, copy, modify, and distribute this software for any |
| * purpose with or without fee is hereby granted, provided that the above |
| * copyright notice and this permission notice appear in all copies. |
| * |
| * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
| * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR |
| * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
| * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| */ |
| |
| #include "config.h" |
| #include "platform.h" |
| |
| #include "openbsd-compat/openbsd-compat.h" |
| |
| extern int use_privsep; |
| |
| void |
| platform_pre_listen(void) |
| { |
| #ifdef LINUX_OOM_ADJUST |
| /* Adjust out-of-memory killer so listening process is not killed */ |
| oom_adjust_setup(); |
| #endif |
| } |
| |
| void |
| platform_pre_fork(void) |
| { |
| #ifdef USE_SOLARIS_PROCESS_CONTRACTS |
| solaris_contract_pre_fork(); |
| #endif |
| } |
| |
| void |
| platform_post_fork_parent(pid_t child_pid) |
| { |
| #ifdef USE_SOLARIS_PROCESS_CONTRACTS |
| solaris_contract_post_fork_parent(child_pid); |
| #endif |
| } |
| |
| void |
| platform_post_fork_child(void) |
| { |
| #ifdef USE_SOLARIS_PROCESS_CONTRACTS |
| solaris_contract_post_fork_child(); |
| #endif |
| #ifdef LINUX_OOM_ADJUST |
| oom_adjust_restore(); |
| #endif |
| } |
| |
| /* |
| * This gets called before switching UIDs, and is called even when sshd is |
| * not running as root. |
| */ |
| void |
| platform_setusercontext(struct passwd *pw) |
| { |
| #ifdef WITH_SELINUX |
| /* Cache selinux status for later use */ |
| (void)ssh_selinux_enabled(); |
| #endif |
| |
| #ifdef USE_SOLARIS_PROJECTS |
| /* if solaris projects were detected, set the default now */ |
| if (getuid() == 0 || geteuid() == 0) |
| solaris_set_default_project(pw); |
| #endif |
| |
| #if defined(HAVE_LOGIN_CAP) && defined (__bsdi__) |
| if (getuid() == 0 || geteuid() == 0) |
| setpgid(0, 0); |
| # endif |
| |
| #if defined(HAVE_LOGIN_CAP) && defined(USE_PAM) |
| /* |
| * If we have both LOGIN_CAP and PAM, we want to establish creds |
| * before calling setusercontext (in session.c:do_setusercontext). |
| */ |
| if (getuid() == 0 || geteuid() == 0) { |
| if (options.use_pam) { |
| do_pam_setcred(use_privsep); |
| } |
| } |
| # endif /* USE_PAM */ |
| } |
| |
| /* |
| * This gets called after we've established the user's groups, and is only |
| * called if sshd is running as root. |
| */ |
| void |
| platform_setusercontext_post_groups(struct passwd *pw) |
| { |
| #if !defined(HAVE_LOGIN_CAP) && defined(USE_LIBIAF) |
| if (set_id(pw->pw_name) != 0) { |
| exit(1); |
| } |
| # endif /* USE_LIBIAF */ |
| |
| #ifdef HAVE_SETPCRED |
| /* |
| * If we have a chroot directory, we set all creds except real |
| * uid which we will need for chroot. If we don't have a |
| * chroot directory, we don't override anything. |
| */ |
| { |
| char **creds = NULL, *chroot_creds[] = |
| { "REAL_USER=root", NULL }; |
| |
| if (options.chroot_directory != NULL && |
| strcasecmp(options.chroot_directory, "none") != 0) |
| creds = chroot_creds; |
| |
| if (setpcred(pw->pw_name, creds) == -1) |
| fatal("Failed to set process credentials"); |
| } |
| #endif /* HAVE_SETPCRED */ |
| #ifdef WITH_SELINUX |
| ssh_selinux_setup_exec_context(pw->pw_name); |
| #endif |
| } |
| |
| char * |
| platform_krb5_get_principal_name(const char *pw_name) |
| { |
| #ifdef USE_AIX_KRB_NAME |
| return aix_krb5_get_principal_name(pw_name); |
| #else |
| return NULL; |
| #endif |
| } |