File: privilege.c

package info (click to toggle)
ndtpd 3.1.2-2
  • links: PTS
  • area: main
  • in suites: woody
  • size: 2,524 kB
  • ctags: 690
  • sloc: ansic: 8,565; sh: 7,275; perl: 655; makefile: 175
file content (119 lines) | stat: -rw-r--r-- 2,864 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
/*
 * Copyright (c) 1997, 98, 2000, 01  
 *    Motoyuki Kasahara
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2, or (at your option)
 * any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 */

/*
 * This program requires the following Autoconf macros:
 *   AC_TYPE_UID_T
 *   AC_TYPE_GID_T
 *   AC_CHECK_HEADERS(unistd.h)
 */

#ifdef HAVE_CONFIG_H
#include "config.h"
#endif

#include <stdio.h>
#include <sys/types.h>
#include <pwd.h>
#include <grp.h>
#include <syslog.h>
#include <errno.h>

#if defined(STDC_HEADERS) || defined(HAVE_STRING_H)
#include <string.h>
#if !defined(STDC_HEADERS) && defined(HAVE_MEMORY_H)
#include <memory.h>
#endif /* not STDC_HEADERS and HAVE_MEMORY_H */
#else /* not STDC_HEADERS and not HAVE_STRING_H */
#include <strings.h>
#endif /* not STDC_HEADERS and not HAVE_STRING_H */

#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif

#ifdef USE_FAKELOG
#include "fakelog.h"
#endif


/*
 * Set UID and GID of the current process.
 * To set a UID, the current UID of the process must be root.
 *
 * If succeeded, 0 is returned.  Otherwise -1 is returned.
 */
int
set_privilege(new_uid, new_gid)
    uid_t new_uid;
    gid_t new_gid;
{
    struct passwd *password_entry;
    uid_t current_uid;
    gid_t current_gid;
    int gid_ok = 0;

    /*
     * Set a GID.
     */
    current_gid = getgid();
    if (new_gid != current_gid) {
	password_entry = getpwuid(new_uid);
	if (password_entry == NULL) {
	    syslog(LOG_ERR, "getpwuid() failed, %s: uid=%d", strerror(errno),
		(int)new_uid);
	    goto failed;
	}
	if (initgroups(password_entry->pw_name, new_gid) < 0) {
	    syslog(LOG_ERR, "initgroups() failed, %s: gid=%d", strerror(errno),
		(int)new_gid);
	    goto failed;
	}
	if (setgid(new_gid) < 0) {
	    syslog(LOG_ERR, "setgid() fialed, %s: gid=%d", strerror(errno),
		(int)new_gid);
	    goto failed;
	}
    }
    gid_ok = 1;

    /*
     * Set an UID only when the UID of the current process is root.
     */
    current_uid = getuid();
    if (current_uid != new_uid) {
	if (current_uid != 0)
	    goto failed;
	if (setuid(new_uid) < 0) {
	    syslog(LOG_ERR, "setuid() fialed, %s: uid=%d", strerror(errno),
		(int)new_uid);
	    goto failed;
	}
    }

    syslog(LOG_DEBUG, "debug: set privilege: uid=%d, gid=%d",
	new_uid, new_gid);
    return 0;

    /*
     * An error occurs...
     */
  failed:
    if (gid_ok)
	syslog(LOG_ERR, "failed to set owner of the process");
    else
	syslog(LOG_ERR, "failed to set owner and group of the process");
    return -1;
}