• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Dropbear SSH
3  *
4  * Copyright (c) 2002,2003 Matt Johnston
5  * All rights reserved.
6  *
7  * Permission is hereby granted, free of charge, to any person obtaining a copy
8  * of this software and associated documentation files (the "Software"), to deal
9  * in the Software without restriction, including without limitation the rights
10  * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
11  * copies of the Software, and to permit persons to whom the Software is
12  * furnished to do so, subject to the following conditions:
13  *
14  * The above copyright notice and this permission notice shall be included in
15  * all copies or substantial portions of the Software.
16  *
17  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22  * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23  * SOFTWARE. */
24 
25 #include "includes.h"
26 #include "buffer.h"
27 #include "dbutil.h"
28 #include "session.h"
29 #include "ssh.h"
30 #include "runopts.h"
31 
32 #ifdef ENABLE_CLI_PASSWORD_AUTH
33 
34 #ifdef ENABLE_CLI_ASKPASS_HELPER
35 /* Returns 1 if we want to use the askpass program, 0 otherwise */
want_askpass()36 static int want_askpass()
37 {
38 	char* askpass_prog = NULL;
39 
40 	askpass_prog = getenv("SSH_ASKPASS");
41 	return askpass_prog && !isatty(STDIN_FILENO) && getenv("DISPLAY");
42 }
43 
44 /* returns a statically allocated password from a helper app, or NULL
45  * on failure */
gui_getpass(const char * prompt)46 static char *gui_getpass(const char *prompt) {
47 
48 	pid_t pid;
49 	int p[2], maxlen, len, status;
50 	static char buf[DROPBEAR_MAX_CLI_PASS + 1];
51 	char* helper = NULL;
52 
53 	TRACE(("enter gui_getpass"))
54 
55 	helper = getenv("SSH_ASKPASS");
56 	if (!helper)
57 	{
58 		TRACE(("leave gui_getpass: no askpass program"))
59 		return NULL;
60 	}
61 
62 	if (pipe(p) < 0) {
63 		TRACE(("error creating child pipe"))
64 		return NULL;
65 	}
66 
67 	pid = fork();
68 
69 	if (pid < 0) {
70 		TRACE(("fork error"))
71 		return NULL;
72 	}
73 
74 	if (!pid) {
75 		/* child */
76 		close(p[0]);
77 		if (dup2(p[1], STDOUT_FILENO) < 0) {
78 			TRACE(("error redirecting stdout"))
79 			exit(1);
80 		}
81 		close(p[1]);
82 		execlp(helper, helper, prompt, (char *)0);
83 		TRACE(("execlp error"))
84 		exit(1);
85 	}
86 
87 	close(p[1]);
88 	maxlen = sizeof(buf);
89 	while (maxlen > 0) {
90 		len = read(p[0], buf + sizeof(buf) - maxlen, maxlen);
91 		if (len > 0) {
92 			maxlen -= len;
93 		} else {
94 			if (errno != EINTR)
95 				break;
96 		}
97 	}
98 
99 	close(p[0]);
100 
101 	while (waitpid(pid, &status, 0) < 0 && errno == EINTR)
102 		;
103 	if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
104 		return(NULL);
105 
106 	len = sizeof(buf) - maxlen;
107 	buf[len] = '\0';
108 	if (len > 0 && buf[len - 1] == '\n')
109 		buf[len - 1] = '\0';
110 
111 	TRACE(("leave gui_getpass"))
112 	return(buf);
113 }
114 #endif /* ENABLE_CLI_ASKPASS_HELPER */
115 
cli_auth_password()116 void cli_auth_password() {
117 
118 	char* password = NULL;
119 	char prompt[80];
120 
121 	TRACE(("enter cli_auth_password"))
122 	CHECKCLEARTOWRITE();
123 
124 	snprintf(prompt, sizeof(prompt), "%s@%s's password: ",
125 				cli_opts.username, cli_opts.remotehost);
126 #ifdef ENABLE_CLI_ASKPASS_HELPER
127 	if (want_askpass())
128 		password = gui_getpass(prompt);
129 	else
130 #endif
131 		password = getpass_or_cancel(prompt);
132 
133 	buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST);
134 
135 	buf_putstring(ses.writepayload, cli_opts.username,
136 			strlen(cli_opts.username));
137 
138 	buf_putstring(ses.writepayload, SSH_SERVICE_CONNECTION,
139 			SSH_SERVICE_CONNECTION_LEN);
140 
141 	buf_putstring(ses.writepayload, AUTH_METHOD_PASSWORD,
142 			AUTH_METHOD_PASSWORD_LEN);
143 
144 	buf_putbyte(ses.writepayload, 0); /* FALSE - so says the spec */
145 
146 	buf_putstring(ses.writepayload, password, strlen(password));
147 
148 	encrypt_packet();
149 	m_burn(password, strlen(password));
150 
151 	TRACE(("leave cli_auth_password"))
152 }
153 #endif	/* ENABLE_CLI_PASSWORD_AUTH */
154