2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 /* These two needed for rxgen output to work */
11 #include <afsconfig.h>
12 #include <afs/param.h>
18 #include <sys/types.h>
34 #include <afs/com_err.h>
36 #include <afs/cellconfig.h>
46 /* This code borrowed heavily from the log program. Here is the intro comment
47 * for that program: */
50 log -- tell the Andrew Cache Manager your password
52 modified February 1986
54 Further modified in August 1987 to understand cell IDs.
58 kpasswd [user [password] [newpassword]] [-c cellname] [-servers <hostlist>]
61 principal is of the form 'name' or 'name@cell' which provides the
62 cellname. See the -c option below.
63 password is the user's password. This form is NOT recommended for
65 newpassword is the new password. This form is NOT recommended for
67 -c identifies cellname as the cell in which authentication is to take
69 -servers allows the explicit specification of the hosts providing
70 authentication services for the cell being used for authentication.
71 This is a debugging option and will disappear.
74 /* The following code to make use of libcmd.a also stolen from klog.c. */
76 int CommandProc(struct cmd_syndesc *, void *);
79 static char **zero_argv;
80 extern int init_child(char *myname);
81 extern int give_to_child(char *pw);
82 extern int terminate_child(char *pw);
93 main(int argc, char *argv[], char **envp)
95 struct cmd_syndesc *ts;
100 * The following signal action for AIX is necessary so that in case of a
101 * crash (i.e. core is generated) we can include the user's data section
102 * in the core dump. Unfortunately, by default, only a partial core is
103 * generated which, in many cases, isn't too useful.
105 struct sigaction nsa;
107 sigemptyset(&nsa.sa_mask);
108 nsa.sa_handler = SIG_DFL;
109 nsa.sa_flags = SA_FULLDUMP;
110 sigaction(SIGSEGV, &nsa, NULL);
117 ts = cmd_CreateSyntax(NULL, CommandProc, 0, "change user's password");
122 #define aNEWPASSWORD 3
127 cmd_AddParm(ts, "-x", CMD_FLAG, CMD_OPTIONAL, "(obsolete, noop)");
128 cmd_AddParm(ts, "-principal", CMD_SINGLE, CMD_OPTIONAL, "user name");
129 cmd_AddParm(ts, "-password", CMD_SINGLE, CMD_OPTIONAL, "user's password");
130 cmd_AddParm(ts, "-newpassword", CMD_SINGLE, CMD_OPTIONAL,
131 "user's new password");
132 cmd_AddParm(ts, "-cell", CMD_SINGLE, CMD_OPTIONAL, "cell name");
133 cmd_AddParm(ts, "-servers", CMD_LIST, CMD_OPTIONAL,
134 "explicit list of servers");
135 cmd_AddParm(ts, "-pipe", CMD_FLAG, CMD_OPTIONAL, "silent operation");
137 code = cmd_Dispatch(argc, argv);
143 getpipepass(char *gpbuf, int len)
145 /* read a password from stdin, stop on \n or eof */
147 memset(gpbuf, 0, len);
148 for (i = 0; i < len; i++) {
150 if (tc == '\n' || tc == EOF)
158 read_pass(char *passwd, int len, char *prompt, int verify)
161 code = read_pw_string(passwd, len, prompt, verify);
163 getpipepass(passwd, len);
170 password_ok(char *newpw, int *insist)
173 /* see if it is reasonable, but don't get so obnoxious */
174 /* FIXME: null pointer derefence!!! */
175 (*insist)++; /* so we don't get called again */
176 if (strlen(newpw) < 6)
179 return 1; /* lie about it */
182 static char rn[] = "kpasswd"; /* Routine name */
183 static int Pipe = 0; /* reading from a pipe */
190 fprintf(stderr, "%s: timed out\n", rn);
195 char passwd[BUFSIZ], npasswd[BUFSIZ], verify[BUFSIZ];
198 CommandProc(struct cmd_syndesc *as, void *arock)
200 char name[MAXKTCNAMELEN] = "";
201 char instance[MAXKTCNAMELEN] = "";
202 char cell[MAXKTCREALMLEN] = "";
203 char realm[MAXKTCREALMLEN] = "";
204 afs_int32 serverList[MAXSERVERS];
205 char *lcell; /* local cellname */
209 struct ubik_client *conn = 0;
210 struct ktc_encryptionKey key;
211 struct ktc_encryptionKey mitkey;
212 struct ktc_encryptionKey newkey;
213 struct ktc_encryptionKey newmitkey;
215 struct ktc_token token;
218 struct passwd *pw = &pwent;
220 int insist; /* insist on good password quality */
221 int lexplicit = 0; /* servers specified explicitly */
222 int local; /* explicit cell is same a local cell */
223 int foundPassword = 0; /*Not yet, anyway */
224 int foundNewPassword = 0; /*Not yet, anyway */
225 int foundExplicitCell = 0; /*Not yet, anyway */
226 #ifdef DEFAULT_MITV4_STRINGTOKEY
228 #elif DEFAULT_AFS_STRINGTOKEY
234 /* blow away command line arguments */
235 for (i = 1; i < zero_argc; i++)
236 memset(zero_argv[i], 0, strlen(zero_argv[i]));
239 /* first determine quiet flag based on -pipe switch */
240 Pipe = (as->parms[aPIPE].items ? 1 : 0);
243 signal(SIGALRM, timedout);
248 if (code || !(lcell = ka_LocalCell())) {
249 #ifndef AFS_FREELANCE_CLIENT
251 afs_com_err(rn, code, "Can't get local cell name!");
259 afs_com_err(rn, code, "Failed to initialize Rx");
263 strcpy(instance, "");
265 /* Parse our arguments. */
267 if (as->parms[aCELL].items) {
269 * cell name explicitly mentioned; take it in if no other cell name
270 * has already been specified and if the name actually appears. If
271 * the given cell name differs from our own, we don't do a lookup.
273 foundExplicitCell = 1;
274 strncpy(realm, as->parms[aCELL].items->data, sizeof(realm));
277 if (as->parms[aSERVERS].items) {
278 /* explicit server list */
281 char *ap[MAXSERVERS + 2];
283 for (ip = as->parms[aSERVERS].items, i = 2; ip; ip = ip->next, i++)
287 code = ubik_ParseClientList(i, ap, serverList);
290 afs_com_err(rn, code, "could not parse server list");
296 if (as->parms[aPRINCIPAL].items) {
297 ka_ParseLoginName(as->parms[aPRINCIPAL].items->data, name, instance,
299 if (strlen(instance) > 0)
302 "Non-null instance (%s) may cause strange behavior.\n",
304 if (strlen(cell) > 0) {
305 if (foundExplicitCell) {
308 "%s: May not specify an explicit cell twice.\n",
312 foundExplicitCell = 1;
313 strncpy(realm, cell, sizeof(realm));
317 /* No explicit name provided: use Unix uid. */
320 if (GetUserName(userName, &userNameLen) == 0) {
323 "Can't figure out your name in local cell %s from your user id.\n",
325 fprintf(stderr, "Try providing the user name.\n");
329 pw->pw_name = userName;
331 pw = getpwuid(getuid());
335 "Can't figure out your name in local cell %s from your user id.\n",
337 fprintf(stderr, "Try providing the user name.\n");
344 if (as->parms[aPASSWORD].items) {
346 * Current argument is the desired password string. Remember it in
347 * our local buffer, and zero out the argument string - anyone can
348 * see it there with ps!
351 strncpy(passwd, as->parms[aPASSWORD].items->data, sizeof(passwd));
352 memset(as->parms[aPASSWORD].items->data, 0,
353 strlen(as->parms[aPASSWORD].items->data));
356 if (as->parms[aNEWPASSWORD].items) {
358 * Current argument is the new password string. Remember it in
359 * our local buffer, and zero out the argument string - anyone can
360 * see it there with ps!
362 foundNewPassword = 1;
363 strncpy(npasswd, as->parms[aNEWPASSWORD].items->data,
365 memset(as->parms[aNEWPASSWORD].items->data, 0,
366 strlen(as->parms[aNEWPASSWORD].items->data));
368 #ifdef AFS_FREELANCE_CLIENT
369 if (!foundExplicitCell && !lcell) {
371 afs_com_err(rn, code, "no cell name provided");
375 if (!foundExplicitCell)
376 strcpy(realm, lcell);
377 #endif /* freelance */
379 if ((code = ka_CellToRealm(realm, realm, &local))) {
381 afs_com_err(rn, code, "Can't convert cell to realm");
384 lcstring(cell, realm, sizeof(cell));
386 ka_PrintUserID("Changing password for '", pw->pw_name, instance, "'");
387 printf(" in cell '%s'.\n", cell);
389 /* Get the password if it wasn't provided. */
390 if (!foundPassword) {
392 getpipepass(passwd, sizeof(passwd));
394 code = read_pass(passwd, sizeof(passwd), "Old password: ", 0);
395 if (code || (strlen(passwd) == 0)) {
398 memset(&mitkey, 0, sizeof(mitkey));
399 memset(&key, 0, sizeof(key));
400 memset(passwd, 0, sizeof(passwd));
402 afs_com_err(rn, code, "reading password");
407 ka_StringToKey(passwd, realm, &key);
408 des_string_to_key(passwd, &mitkey);
409 give_to_child(passwd);
411 /* Get new password if it wasn't provided. */
413 if (!foundNewPassword) {
415 getpipepass(npasswd, sizeof(npasswd));
419 read_pass(npasswd, sizeof(npasswd),
420 "New password (RETURN to abort): ", 0);
421 if (code || (strlen(npasswd) == 0)) {
427 } while (password_bad(npasswd));
430 read_pass(verify, sizeof(verify), "Retype new password: ", 0);
435 if (strcmp(verify, npasswd) != 0) {
436 printf("Mismatch - ");
439 memset(verify, 0, sizeof(verify));
442 if ((code = password_bad(npasswd))) { /* assmt here! */
443 goto no_change_no_msg;
446 if (strlen(npasswd) > 8) {
449 "%s: password too long, only the first 8 chars will be used.\n",
452 npasswd[8] = 0; /* in case the password was exactly 8 chars long */
454 ka_StringToKey(npasswd, realm, &newkey);
455 des_string_to_key(npasswd, &newmitkey);
456 memset(npasswd, 0, sizeof(npasswd));
459 ka_ExplicitCell(realm, serverList);
461 /* Get an connection to kaserver's admin service in desired cell. Set the
462 * lifetime above the time uncertainty so that badly skewed clocks are
463 * reported when the ticket is decrypted. Then give us 10 seconds to
464 * actually get our work done if the clocks are skewed by only 14:59.
465 * NOTE: Kerberos lifetime encoding will round this up to next 5 minute
466 * interval, namely 20 minutes. */
468 #define ADMIN_LIFETIME (KTC_TIME_UNCERTAINTY+1)
471 ka_GetAdminToken(pw->pw_name, instance, realm, &key, ADMIN_LIFETIME,
472 &token, /*!new */ 0);
473 if (code == KABADREQUEST) {
475 ka_GetAdminToken(pw->pw_name, instance, realm, &mitkey,
476 ADMIN_LIFETIME, &token, /*!new */ 0);
477 if ((code == KABADREQUEST) && (strlen(passwd) > 8)) {
478 /* try with only the first 8 characters incase they set their password
479 * with an old style passwd program. */
481 strncpy(pass8, passwd, 8);
483 ka_StringToKey(pass8, realm, &key);
484 memset(pass8, 0, sizeof(pass8));
485 memset(passwd, 0, sizeof(passwd));
486 code = ka_GetAdminToken(pw->pw_name, instance, realm, &key, ADMIN_LIFETIME, &token, /*!new */
489 /* the folks in testing really *hate* this message */
492 "Warning: only the first 8 characters of your old password were significant.\n");
508 memset(&mitkey, 0, sizeof(mitkey));
509 memset(&key, 0, sizeof(key));
510 if (code == KAUBIKCALL)
511 afs_com_err(rn, code, "(Authentication Server unavailable, try later)");
513 if (code == KABADREQUEST)
514 fprintf(stderr, "%s: Incorrect old password.\n", rn);
516 afs_com_err(rn, code, "so couldn't change password");
519 ka_AuthServerConn(realm, KA_MAINTENANCE_SERVICE, &token, &conn);
521 afs_com_err(rn, code, "contacting Admin Server");
525 ka_ChangePassword(pw->pw_name, instance, conn, 0,
529 ka_ChangePassword(pw->pw_name, instance, conn, 0,
531 memset(&newkey, 0, sizeof(newkey));
532 memset(&newmitkey, 0, sizeof(newmitkey));
535 reason = (char *)afs_error_message(code);
536 fprintf(stderr, "%s: Password was not changed because %s\n",
539 printf("Password changed.\n\n");
542 memset(&newkey, 0, sizeof(newkey));
543 memset(&newmitkey, 0, sizeof(newmitkey));
545 /* Might need to close down the ubik_Client connection */
547 ubik_ClientDestroy(conn);
551 terminate_child(NULL);
554 no_change: /* yuck, yuck, yuck */
556 afs_com_err(rn, code, "getting new password");
558 memset(&key, 0, sizeof(key));
559 memset(npasswd, 0, sizeof(npasswd));
560 printf("Password for '%s' in cell '%s' unchanged.\n\n", pw->pw_name,
562 terminate_child(NULL);
563 exit(code ? code : 1);