mirror of https://github.com/sudo-project/sudo.git
489 lines
13 KiB
C
489 lines
13 KiB
C
/*
|
|
* SPDX-License-Identifier: ISC
|
|
*
|
|
* Copyright (c) 2009-2015, 2019-2023 Todd C. Miller <Todd.Miller@sudo.ws>
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
|
|
/*
|
|
* This is an open source non-commercial project. Dear PVS-Studio, please check it.
|
|
* PVS-Studio Static Code Analyzer for C, C++ and C#: http://www.viva64.com
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include <sys/wait.h>
|
|
#include <stdarg.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include <sudoers.h>
|
|
#ifdef SUDOERS_LOG_CLIENT
|
|
# include <log_client.h>
|
|
#endif
|
|
|
|
#ifdef HAVE_BSM_AUDIT
|
|
# include <bsm_audit.h>
|
|
#endif
|
|
#ifdef HAVE_LINUX_AUDIT
|
|
# include <linux_audit.h>
|
|
#endif
|
|
#ifdef HAVE_SOLARIS_AUDIT
|
|
# include <solaris_audit.h>
|
|
#endif
|
|
|
|
#ifdef SUDOERS_LOG_CLIENT
|
|
static struct log_details audit_details;
|
|
#endif
|
|
char *audit_msg = NULL;
|
|
|
|
/* sudoers_audit is declared at the end of this file. */
|
|
extern sudo_dso_public struct audit_plugin sudoers_audit;
|
|
|
|
static int
|
|
audit_success(const struct sudoers_context *ctx, char *const argv[])
|
|
{
|
|
int rc = 0;
|
|
debug_decl(audit_success, SUDOERS_DEBUG_AUDIT);
|
|
|
|
if (argv != NULL) {
|
|
#ifdef HAVE_BSM_AUDIT
|
|
if (bsm_audit_success(ctx, argv) == -1)
|
|
rc = -1;
|
|
#endif
|
|
#ifdef HAVE_LINUX_AUDIT
|
|
if (linux_audit_command(argv, 1) == -1)
|
|
rc = -1;
|
|
#endif
|
|
#ifdef HAVE_SOLARIS_AUDIT
|
|
if (solaris_audit_success(ctx, argv) == -1)
|
|
rc = -1;
|
|
#endif
|
|
}
|
|
|
|
debug_return_int(rc);
|
|
}
|
|
|
|
static int
|
|
audit_failure_int(const struct sudoers_context *ctx, char *const argv[],
|
|
const char *message)
|
|
{
|
|
int ret = 0;
|
|
debug_decl(audit_failure_int, SUDOERS_DEBUG_AUDIT);
|
|
|
|
#if defined(HAVE_BSM_AUDIT) || defined(HAVE_LINUX_AUDIT)
|
|
if (def_log_denied && argv != NULL) {
|
|
#ifdef HAVE_BSM_AUDIT
|
|
if (bsm_audit_failure(ctx, argv, message) == -1)
|
|
ret = -1;
|
|
#endif
|
|
#ifdef HAVE_LINUX_AUDIT
|
|
if (linux_audit_command(argv, 0) == -1)
|
|
ret = -1;
|
|
#endif
|
|
#ifdef HAVE_SOLARIS_AUDIT
|
|
if (solaris_audit_failure(ctx, argv, message) == -1)
|
|
ret = -1;
|
|
#endif
|
|
}
|
|
#endif /* HAVE_BSM_AUDIT || HAVE_LINUX_AUDIT */
|
|
|
|
debug_return_int(ret);
|
|
}
|
|
|
|
int
|
|
vaudit_failure(const struct sudoers_context *ctx, char *const argv[],
|
|
char const * restrict const fmt, va_list ap)
|
|
{
|
|
int oldlocale, ret;
|
|
char *message;
|
|
debug_decl(vaudit_failure, SUDOERS_DEBUG_AUDIT);
|
|
|
|
/* Audit messages should be in the sudoers locale. */
|
|
sudoers_setlocale(SUDOERS_LOCALE_SUDOERS, &oldlocale);
|
|
|
|
if ((ret = vasprintf(&message, _(fmt), ap)) == -1)
|
|
sudo_warnx(U_("%s: %s"), __func__, U_("unable to allocate memory"));
|
|
|
|
if (ret != -1) {
|
|
/* Set audit_msg for audit plugins. */
|
|
free(audit_msg);
|
|
audit_msg = message;
|
|
|
|
ret = audit_failure_int(ctx, argv, audit_msg);
|
|
}
|
|
|
|
sudoers_setlocale(oldlocale, NULL);
|
|
|
|
debug_return_int(ret);
|
|
}
|
|
|
|
int
|
|
audit_failure(const struct sudoers_context *ctx, char *const argv[],
|
|
char const * restrict const fmt, ...)
|
|
{
|
|
va_list ap;
|
|
int ret;
|
|
debug_decl(audit_failure, SUDOERS_DEBUG_AUDIT);
|
|
|
|
va_start(ap, fmt);
|
|
ret = vaudit_failure(ctx, argv, fmt, ap);
|
|
va_end(ap);
|
|
|
|
debug_return_int(ret);
|
|
}
|
|
|
|
static int
|
|
sudoers_audit_open(unsigned int version, sudo_conv_t conversation,
|
|
sudo_printf_t plugin_printf, char * const settings[],
|
|
char * const user_info[], int submit_optind, char * const submit_argv[],
|
|
char * const submit_envp[], char * const plugin_options[],
|
|
const char **errstr)
|
|
{
|
|
struct sudo_conf_debug_file_list debug_files = TAILQ_HEAD_INITIALIZER(debug_files);
|
|
struct sudoers_open_info info;
|
|
const char *cp, *plugin_path = NULL;
|
|
char * const *cur;
|
|
int ret;
|
|
debug_decl(sudoers_audit_open, SUDOERS_DEBUG_PLUGIN);
|
|
|
|
sudo_conv = conversation;
|
|
sudo_printf = plugin_printf;
|
|
if (sudoers_audit.event_alloc != NULL)
|
|
plugin_event_alloc = sudoers_audit.event_alloc;
|
|
|
|
bindtextdomain("sudoers", LOCALEDIR);
|
|
|
|
/* Initialize the debug subsystem. */
|
|
for (cur = settings; (cp = *cur) != NULL; cur++) {
|
|
if (strncmp(cp, "debug_flags=", sizeof("debug_flags=") - 1) == 0) {
|
|
cp += sizeof("debug_flags=") - 1;
|
|
if (!sudoers_debug_parse_flags(&debug_files, cp))
|
|
debug_return_int(-1);
|
|
continue;
|
|
}
|
|
if (strncmp(cp, "plugin_path=", sizeof("plugin_path=") - 1) == 0) {
|
|
plugin_path = cp + sizeof("plugin_path=") - 1;
|
|
continue;
|
|
}
|
|
}
|
|
if (!sudoers_debug_register(plugin_path, &debug_files))
|
|
debug_return_int(-1);
|
|
|
|
/* Call the sudoers init function. */
|
|
info.settings = settings;
|
|
info.user_info = user_info;
|
|
info.plugin_args = plugin_options;
|
|
ret = sudoers_init(&info, log_parse_error, submit_envp);
|
|
|
|
if (ret == true) {
|
|
/* Unset close function if we don't need it to avoid extra process. */
|
|
#ifdef SUDOERS_LOG_CLIENT
|
|
if (client_closure == NULL)
|
|
#endif
|
|
sudoers_audit.close = NULL;
|
|
} else {
|
|
/* The audit functions set audit_msg on failure. */
|
|
if (audit_msg != NULL)
|
|
*errstr = audit_msg;
|
|
}
|
|
|
|
debug_return_int(ret);
|
|
}
|
|
|
|
static void
|
|
audit_to_eventlog(const struct sudoers_context *ctx, struct eventlog *evlog,
|
|
char * const command_info[], char * const run_argv[],
|
|
char * const run_envp[], const char *uuid_str)
|
|
{
|
|
char * const *cur;
|
|
debug_decl(audit_to_eventlog, SUDOERS_DEBUG_PLUGIN);
|
|
|
|
/* Fill in evlog from sudoers Defaults, run_argv and run_envp. */
|
|
sudoers_to_eventlog(ctx, evlog, NULL, run_argv, run_envp, uuid_str);
|
|
|
|
/* Update iolog and execution environment from command_info[]. */
|
|
if (command_info != NULL) {
|
|
for (cur = command_info; *cur != NULL; cur++) {
|
|
switch (**cur) {
|
|
case 'c':
|
|
if (strncmp(*cur, "command=", sizeof("command=") - 1) == 0) {
|
|
evlog->command = *cur + sizeof("command=") - 1;
|
|
continue;
|
|
}
|
|
if (strncmp(*cur, "chroot=", sizeof("chroot=") - 1) == 0) {
|
|
evlog->runchroot = *cur + sizeof("chroot=") - 1;
|
|
continue;
|
|
}
|
|
break;
|
|
case 'i':
|
|
if (strncmp(*cur, "iolog_path=", sizeof("iolog_path=") - 1) == 0) {
|
|
evlog->iolog_path = *cur + sizeof("iolog_path=") - 1;
|
|
continue;
|
|
}
|
|
break;
|
|
case 'r':
|
|
if (strncmp(*cur, "runcwd=", sizeof("runcwd=") - 1) == 0) {
|
|
evlog->runcwd = *cur + sizeof("runcwd=") - 1;
|
|
continue;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
|
|
#ifdef SUDOERS_LOG_CLIENT
|
|
static bool
|
|
log_server_accept(const struct sudoers_context *ctx, struct eventlog *evlog)
|
|
{
|
|
struct timespec start_time;
|
|
bool ret = false;
|
|
debug_decl(log_server_accept, SUDOERS_DEBUG_PLUGIN);
|
|
|
|
if (SLIST_EMPTY(&def_log_servers))
|
|
debug_return_bool(true);
|
|
|
|
if (client_closure != NULL && ISSET(ctx->mode, MODE_POLICY_INTERCEPTED)) {
|
|
/* Older servers don't support multiple commands per session. */
|
|
if (!client_closure->subcommands)
|
|
debug_return_bool(true);
|
|
} else {
|
|
/* Only send accept event to log server if I/O log plugin did not. */
|
|
if (iolog_enabled)
|
|
debug_return_bool(true);
|
|
}
|
|
|
|
if (sudo_gettime_awake(&start_time) == -1) {
|
|
sudo_warn("%s", U_("unable to get time of day"));
|
|
goto done;
|
|
}
|
|
|
|
if (client_closure != NULL) {
|
|
/* Use existing client closure. */
|
|
if (fmt_accept_message(client_closure, evlog)) {
|
|
if (client_closure->write_ev->add(client_closure->write_ev,
|
|
&client_closure->log_details->server_timeout) == -1) {
|
|
sudo_warn("%s", U_("unable to add event to queue"));
|
|
goto done;
|
|
}
|
|
ret = true;
|
|
}
|
|
} else {
|
|
if (!init_log_details(&audit_details, evlog))
|
|
goto done;
|
|
|
|
/* Open connection to log server, send hello and accept messages. */
|
|
client_closure = log_server_open(&audit_details, &start_time, false,
|
|
SEND_ACCEPT, NULL);
|
|
if (client_closure != NULL)
|
|
ret = true;
|
|
}
|
|
|
|
done:
|
|
debug_return_bool(ret);
|
|
}
|
|
|
|
static void
|
|
log_server_exit(int status_type, int status)
|
|
{
|
|
debug_decl(log_server_exit, SUDOERS_DEBUG_PLUGIN);
|
|
|
|
if (client_closure != NULL) {
|
|
int exit_status = 0, error = 0;
|
|
|
|
if (status_type == SUDO_PLUGIN_WAIT_STATUS) {
|
|
if (WIFEXITED(status))
|
|
exit_status = WEXITSTATUS(status);
|
|
else
|
|
exit_status = WTERMSIG(status) | 128;
|
|
} else {
|
|
/* Must be errno. */
|
|
error = status;
|
|
}
|
|
log_server_close(client_closure, exit_status, error);
|
|
client_closure = NULL;
|
|
free(audit_details.evlog);
|
|
audit_details.evlog = NULL;
|
|
}
|
|
|
|
debug_return;
|
|
}
|
|
#else
|
|
static bool
|
|
log_server_accept(const struct sudoers_context *ctx, struct eventlog *evlog)
|
|
{
|
|
return true;
|
|
}
|
|
|
|
static void
|
|
log_server_exit(int status_type, int status)
|
|
{
|
|
return;
|
|
}
|
|
#endif /* SUDOERS_LOG_CLIENT */
|
|
|
|
static int
|
|
sudoers_audit_accept(const char *plugin_name, unsigned int plugin_type,
|
|
char * const command_info[], char * const run_argv[],
|
|
char * const run_envp[], const char **errstr)
|
|
{
|
|
const struct sudoers_context *ctx = sudoers_get_context();
|
|
const char *uuid_str = NULL;
|
|
struct eventlog evlog;
|
|
static bool first = true;
|
|
int ret = true;
|
|
debug_decl(sudoers_audit_accept, SUDOERS_DEBUG_PLUGIN);
|
|
|
|
/* Only log the accept event from the sudo front-end */
|
|
if (plugin_type != SUDO_FRONT_END)
|
|
debug_return_int(true);
|
|
|
|
/* Log sub-commands with the uuid of the original command. */
|
|
if (!ISSET(ctx->mode, MODE_POLICY_INTERCEPTED))
|
|
uuid_str = ctx->uuid_str;
|
|
|
|
/*
|
|
* We must always call log_allowed() even if def_log_allowed is disabled
|
|
* since it will send mail if def_mail_always or def_mail_all_cmnds are
|
|
* set (it has its own checks for def_log_allowed).
|
|
*/
|
|
audit_to_eventlog(ctx, &evlog, command_info, run_argv, run_envp, uuid_str);
|
|
if (!log_allowed(ctx, &evlog) && !def_ignore_logfile_errors)
|
|
ret = false;
|
|
|
|
/*
|
|
* Skip auditing and log server logging if "log_allowed" is disabled.
|
|
*/
|
|
if (!def_log_allowed)
|
|
goto done;
|
|
|
|
if (audit_success(ctx, run_argv) != 0) {
|
|
if (!def_ignore_logfile_errors)
|
|
ret = false;
|
|
}
|
|
|
|
if (!log_server_accept(ctx, &evlog)) {
|
|
if (!def_ignore_logfile_errors)
|
|
ret = false;
|
|
}
|
|
|
|
if (first) {
|
|
/* log_subcmds doesn't go through sudo_policy_main again to set this. */
|
|
if (def_log_subcmds) {
|
|
if (!sudoers_set_mode(MODE_POLICY_INTERCEPTED, UINT_MAX)) {
|
|
sudo_debug_printf(SUDO_DEBUG_ERROR|SUDO_DEBUG_LINENO,
|
|
"unable to set 0x%x in ctx->mode", MODE_POLICY_INTERCEPTED);
|
|
}
|
|
}
|
|
first = false;
|
|
}
|
|
|
|
done:
|
|
debug_return_int(ret);
|
|
}
|
|
|
|
static int
|
|
sudoers_audit_reject(const char *plugin_name, unsigned int plugin_type,
|
|
const char *message, char * const command_info[], const char **errstr)
|
|
{
|
|
const struct sudoers_context *ctx = sudoers_get_context();
|
|
struct eventlog evlog;
|
|
int ret = true;
|
|
debug_decl(sudoers_audit_reject, SUDOERS_DEBUG_PLUGIN);
|
|
|
|
/* Skip reject events that sudoers generated itself. */
|
|
if (strncmp(plugin_name, "sudoers_", 8) == 0)
|
|
debug_return_int(true);
|
|
|
|
if (!def_log_denied)
|
|
debug_return_int(true);
|
|
|
|
if (audit_failure_int(ctx, ctx->runas.argv, message) != 0) {
|
|
if (!def_ignore_audit_errors)
|
|
ret = false;
|
|
}
|
|
|
|
audit_to_eventlog(ctx, &evlog, command_info, ctx->runas.argv, NULL, NULL);
|
|
if (!eventlog_reject(&evlog, 0, message, NULL, NULL))
|
|
ret = false;
|
|
|
|
if (!log_server_reject(ctx, &evlog, message))
|
|
ret = false;
|
|
|
|
debug_return_int(ret);
|
|
}
|
|
|
|
static int
|
|
sudoers_audit_error(const char *plugin_name, unsigned int plugin_type,
|
|
const char *message, char * const command_info[], const char **errstr)
|
|
{
|
|
const struct sudoers_context *ctx = sudoers_get_context();
|
|
struct eventlog evlog;
|
|
int ret = true;
|
|
debug_decl(sudoers_audit_error, SUDOERS_DEBUG_PLUGIN);
|
|
|
|
/* Skip error events that sudoers generated itself. */
|
|
if (strncmp(plugin_name, "sudoers_", 8) == 0)
|
|
debug_return_int(true);
|
|
|
|
if (audit_failure_int(ctx, ctx->runas.argv, message) != 0) {
|
|
if (!def_ignore_audit_errors)
|
|
ret = false;
|
|
}
|
|
|
|
audit_to_eventlog(ctx, &evlog, command_info, ctx->runas.argv, NULL, NULL);
|
|
if (!eventlog_alert(&evlog, 0, &evlog.event_time, message, NULL))
|
|
ret = false;
|
|
|
|
if (!log_server_alert(ctx, &evlog, message, NULL))
|
|
ret = false;
|
|
|
|
debug_return_int(ret);
|
|
}
|
|
|
|
static void
|
|
sudoers_audit_close(int status_type, int status)
|
|
{
|
|
log_server_exit(status_type, status);
|
|
}
|
|
|
|
static int
|
|
sudoers_audit_version(int verbose)
|
|
{
|
|
debug_decl(sudoers_audit_version, SUDOERS_DEBUG_PLUGIN);
|
|
|
|
sudo_printf(SUDO_CONV_INFO_MSG, "Sudoers audit plugin version %s\n",
|
|
PACKAGE_VERSION);
|
|
|
|
debug_return_int(true);
|
|
}
|
|
|
|
sudo_dso_public struct audit_plugin sudoers_audit = {
|
|
SUDO_AUDIT_PLUGIN,
|
|
SUDO_API_VERSION,
|
|
sudoers_audit_open,
|
|
sudoers_audit_close,
|
|
sudoers_audit_accept,
|
|
sudoers_audit_reject,
|
|
sudoers_audit_error,
|
|
sudoers_audit_version,
|
|
NULL, /* register_hooks */
|
|
NULL, /* deregister_hooks */
|
|
NULL /* event_alloc() filled in by sudo */
|
|
};
|