added non pam authentication
This commit is contained in:
parent
86ecad1197
commit
74a67d2d3f
29
Makefile
Normal file
29
Makefile
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
|
||||||
|
DESTDIR = /usr/local/xrdp
|
||||||
|
|
||||||
|
all: world
|
||||||
|
|
||||||
|
world:
|
||||||
|
make -C vnc
|
||||||
|
make -C xrdp
|
||||||
|
make -C sesman
|
||||||
|
|
||||||
|
clean:
|
||||||
|
make -C vnc clean
|
||||||
|
make -C xrdp clean
|
||||||
|
make -C sesman clean
|
||||||
|
|
||||||
|
install:
|
||||||
|
mkdir -p $(DESTDIR)
|
||||||
|
install xrdp/xrdp $(DESTDIR)/xrdp
|
||||||
|
install xrdp/ad256.bmp $(DESTDIR)/ad256.bmp
|
||||||
|
install xrdp/xrdp256.bmp $(DESTDIR)/xrdp256.bmp
|
||||||
|
install xrdp/cursor0.cur $(DESTDIR)/cursor0.cur
|
||||||
|
install xrdp/cursor1.cur $(DESTDIR)/cursor1.cur
|
||||||
|
install xrdp/Tahoma-10.fv1 $(DESTDIR)/Tahoma-10.fv1
|
||||||
|
install vnc/libvnc.so $(DESTDIR)/libvnc.so
|
||||||
|
install sesman/sesman $(DESTDIR)/sesman
|
||||||
|
install instfiles/sesman.ini $(DESTDIR)/sesman.ini
|
||||||
|
install instfiles/startwm.sh $(DESTDIR)/startwm.sh
|
||||||
|
install instfiles/xrdp.ini $(DESTDIR)/xrdp.ini
|
||||||
|
install instfiles/xrdpstart.sh $(DESTDIR)/xrdpstart.sh
|
@ -1,10 +1,22 @@
|
|||||||
|
|
||||||
SESMANOBJ = sesman.o os_calls.o d3des.o
|
# uncomment the next line to use pam_userpass
|
||||||
|
# in verify_user.c
|
||||||
|
#USE_PAM = ""
|
||||||
|
|
||||||
|
SESMANOBJ = sesman.o verify_user.o os_calls.o d3des.o
|
||||||
|
|
||||||
|
ifdef USE_PAM
|
||||||
|
CFLAGS = -Wall -O2 -I../common -DUSE_PAM
|
||||||
|
else
|
||||||
CFLAGS = -Wall -O2 -I../common
|
CFLAGS = -Wall -O2 -I../common
|
||||||
|
endif
|
||||||
C_OS_FLAGS = $(CFLAGS) -c
|
C_OS_FLAGS = $(CFLAGS) -c
|
||||||
LDFLAGS = -L /usr/gnu/lib
|
LDFLAGS = -L /usr/gnu/lib
|
||||||
LIBS = -lpam_userpass -lpam
|
ifdef USE_PAM
|
||||||
|
LIBS = -lpam -lpam_userpass
|
||||||
|
else
|
||||||
|
LIBS = -ldl -lcrypt
|
||||||
|
endif
|
||||||
PAMLIB =
|
PAMLIB =
|
||||||
CC = gcc
|
CC = gcc
|
||||||
|
|
||||||
|
@ -37,16 +37,14 @@
|
|||||||
|
|
||||||
#include "d3des.h"
|
#include "d3des.h"
|
||||||
|
|
||||||
#include <security/pam_userpass.h>
|
|
||||||
|
|
||||||
#include "arch.h"
|
#include "arch.h"
|
||||||
#include "parse.h"
|
#include "parse.h"
|
||||||
#include "os_calls.h"
|
#include "os_calls.h"
|
||||||
|
|
||||||
#define SERVICE "xrdp"
|
int auth_userpass(char* user, char* pass);
|
||||||
|
|
||||||
int g_sck;
|
static int g_sck;
|
||||||
int g_pid;
|
static int g_pid;
|
||||||
|
|
||||||
struct session_item
|
struct session_item
|
||||||
{
|
{
|
||||||
@ -60,7 +58,7 @@ struct session_item
|
|||||||
|
|
||||||
static unsigned char s_fixedkey[8] = {23, 82, 107, 6, 35, 78, 88, 7};
|
static unsigned char s_fixedkey[8] = {23, 82, 107, 6, 35, 78, 88, 7};
|
||||||
|
|
||||||
struct session_item session_items[100];
|
static struct session_item session_items[100];
|
||||||
|
|
||||||
/*****************************************************************************/
|
/*****************************************************************************/
|
||||||
int tcp_force_recv(int sck, char* data, int len)
|
int tcp_force_recv(int sck, char* data, int len)
|
||||||
@ -184,47 +182,6 @@ int x_server_running(int display)
|
|||||||
return access(text, F_OK) == 0;
|
return access(text, F_OK) == 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
/******************************************************************************/
|
|
||||||
/* returns boolean */
|
|
||||||
int auth_pam_userpass(const char* user, const char* pass)
|
|
||||||
{
|
|
||||||
pam_handle_t* pamh;
|
|
||||||
pam_userpass_t userpass;
|
|
||||||
struct pam_conv conv = {pam_userpass_conv, &userpass};
|
|
||||||
const void* template1;
|
|
||||||
int status;
|
|
||||||
|
|
||||||
userpass.user = user;
|
|
||||||
userpass.pass = pass;
|
|
||||||
if (pam_start(SERVICE, user, &conv, &pamh) != PAM_SUCCESS)
|
|
||||||
{
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
status = pam_authenticate(pamh, 0);
|
|
||||||
if (status != PAM_SUCCESS)
|
|
||||||
{
|
|
||||||
pam_end(pamh, status);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
status = pam_acct_mgmt(pamh, 0);
|
|
||||||
if (status != PAM_SUCCESS)
|
|
||||||
{
|
|
||||||
pam_end(pamh, status);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
status = pam_get_item(pamh, PAM_USER, &template1);
|
|
||||||
if (status != PAM_SUCCESS)
|
|
||||||
{
|
|
||||||
pam_end(pamh, status);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
if (pam_end(pamh, PAM_SUCCESS) != PAM_SUCCESS)
|
|
||||||
{
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
/******************************************************************************/
|
/******************************************************************************/
|
||||||
void cterm(int s)
|
void cterm(int s)
|
||||||
{
|
{
|
||||||
@ -503,7 +460,7 @@ start session\n");
|
|||||||
in_uint16_be(in_s, height);
|
in_uint16_be(in_s, height);
|
||||||
in_uint16_be(in_s, bpp);
|
in_uint16_be(in_s, bpp);
|
||||||
//g_printf("%d %d %d\n", width, height, bpp);
|
//g_printf("%d %d %d\n", width, height, bpp);
|
||||||
ok = auth_pam_userpass(user, pass);
|
ok = auth_userpass(user, pass);
|
||||||
display = 0;
|
display = 0;
|
||||||
if (ok)
|
if (ok)
|
||||||
{
|
{
|
||||||
|
137
sesman/verify_user.c
Normal file
137
sesman/verify_user.c
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
/*
|
||||||
|
This program is free software; you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation; either version 2 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program; if not, write to the Free Software
|
||||||
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||||
|
|
||||||
|
xrdp: A Remote Desktop Protocol server.
|
||||||
|
Copyright (C) Jay Sorg 2005
|
||||||
|
|
||||||
|
authenticate user
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifdef USE_PAM
|
||||||
|
|
||||||
|
#include <security/pam_userpass.h>
|
||||||
|
|
||||||
|
#define SERVICE "xrdp"
|
||||||
|
|
||||||
|
/******************************************************************************/
|
||||||
|
/* returns boolean */
|
||||||
|
int auth_userpass(char* user, char* pass)
|
||||||
|
{
|
||||||
|
pam_handle_t* pamh;
|
||||||
|
pam_userpass_t userpass;
|
||||||
|
struct pam_conv conv = {pam_userpass_conv, &userpass};
|
||||||
|
const void* template1;
|
||||||
|
int status;
|
||||||
|
|
||||||
|
userpass.user = user;
|
||||||
|
userpass.pass = pass;
|
||||||
|
if (pam_start(SERVICE, user, &conv, &pamh) != PAM_SUCCESS)
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
status = pam_authenticate(pamh, 0);
|
||||||
|
if (status != PAM_SUCCESS)
|
||||||
|
{
|
||||||
|
pam_end(pamh, status);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
status = pam_acct_mgmt(pamh, 0);
|
||||||
|
if (status != PAM_SUCCESS)
|
||||||
|
{
|
||||||
|
pam_end(pamh, status);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
status = pam_get_item(pamh, PAM_USER, &template1);
|
||||||
|
if (status != PAM_SUCCESS)
|
||||||
|
{
|
||||||
|
pam_end(pamh, status);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
if (pam_end(pamh, PAM_SUCCESS) != PAM_SUCCESS)
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
#else
|
||||||
|
|
||||||
|
#define _XOPEN_SOURCE
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <shadow.h>
|
||||||
|
#include <pwd.h>
|
||||||
|
|
||||||
|
/******************************************************************************/
|
||||||
|
/* returns boolean */
|
||||||
|
int auth_userpass(char* user, char* pass)
|
||||||
|
{
|
||||||
|
char salt[13] = "$1$";
|
||||||
|
char hash[35] = "";
|
||||||
|
char* encr = 0;
|
||||||
|
struct passwd* spw;
|
||||||
|
struct spwd* stp;
|
||||||
|
int saltcnt = 0;
|
||||||
|
|
||||||
|
spw = getpwnam(user);
|
||||||
|
if (spw == 0)
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
if (strncmp(spw->pw_passwd, "x", 3) == 0)
|
||||||
|
{
|
||||||
|
/* the system is using shadow */
|
||||||
|
stp = getspnam(user);
|
||||||
|
if (stp == 0)
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
strncpy(hash, stp->sp_pwdp, 34);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
/* old system with only passwd */
|
||||||
|
strncpy(hash, spw->pw_passwd, 34);
|
||||||
|
}
|
||||||
|
hash[34] = '\0';
|
||||||
|
if (strncmp(hash, "$1$", 3) == 0)
|
||||||
|
{
|
||||||
|
/* gnu style crypt(); */
|
||||||
|
saltcnt = 3;
|
||||||
|
while ((hash[saltcnt] != '$') && (saltcnt < 11))
|
||||||
|
{
|
||||||
|
salt[saltcnt] = hash[saltcnt];
|
||||||
|
saltcnt++;
|
||||||
|
}
|
||||||
|
salt[saltcnt] = '$';
|
||||||
|
salt[saltcnt + 1] = '\0';
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
/* classic two char salt */
|
||||||
|
salt[0] = hash[0];
|
||||||
|
salt[1] = hash[1];
|
||||||
|
salt[2] = '\0';
|
||||||
|
}
|
||||||
|
encr = crypt(pass,salt);
|
||||||
|
if (strncmp(encr, hash, 34) != 0)
|
||||||
|
{
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
#endif
|
Loading…
Reference in New Issue
Block a user