#include <assert.h>
#include <priv.h>
#include <pwd.h>
#include <signal.h>
#include <stdlib.h>
#include <string.h>
#include <syslog.h>
#include <unistd.h>
#include <sys/wait.h>
#include <bsm/adt.h>
#include <bsm/adt_event.h>
#include "login_audit.h"
static void audit_logout(adt_session_data_t *);
void
audit_success(uint_t event_id, struct passwd *pwd, char *optional_text)
{
adt_session_data_t *ah;
adt_event_data_t *event;
int rc;
assert(pwd != NULL);
if (adt_start_session(&ah, NULL, ADT_USE_PROC_DATA)) {
syslog(LOG_AUTH | LOG_ALERT, "login adt_start_session(): %m");
return;
}
if (adt_set_user(ah, pwd->pw_uid, pwd->pw_gid,
pwd->pw_uid, pwd->pw_gid, NULL, ADT_USER)) {
syslog(LOG_AUTH | LOG_ALERT, "login adt_set_user(): %m");
(void) adt_end_session(ah);
return;
}
event = adt_alloc_event(ah, event_id);
if (event == NULL)
return;
switch (event_id) {
case ADT_zlogin:
event->adt_zlogin.message = optional_text;
break;
default:
break;
}
rc = adt_put_event(event, ADT_SUCCESS, ADT_SUCCESS);
(void) adt_free_event(event);
if (rc) {
(void) adt_end_session(ah);
syslog(LOG_AUTH | LOG_ALERT, "login adt_put_event(): %m");
return;
}
if (adt_audit_enabled()) {
switch (event_id) {
case ADT_login:
case ADT_rlogin:
case ADT_telnet:
case ADT_zlogin:
audit_logout(ah);
break;
}
}
(void) adt_end_session(ah);
}
static void
audit_logout(adt_session_data_t *ah)
{
adt_event_data_t *logout;
int status;
pid_t pid;
priv_set_t *priv;
if ((logout = adt_alloc_event(ah, ADT_logout)) == NULL) {
syslog(LOG_AUTH | LOG_ALERT,
"adt_alloc_event(ADT_logout): %m");
return;
}
if ((priv = priv_allocset()) == NULL) {
syslog(LOG_AUTH | LOG_ALERT,
"login audit_logout: could not alloc basic privs: %m");
adt_free_event(logout);
return;
}
if ((pid = fork()) == 0) {
adt_free_event(logout);
priv_freeset(priv);
return;
}
if (pid == -1) {
syslog(LOG_AUTH | LOG_ALERT,
"login audit_logout: could not fork: %m");
adt_free_event(logout);
priv_freeset(priv);
return;
}
if (chdir("/") != 0) {
syslog(LOG_AUTH | LOG_ALERT,
"login audit_logut: could not chdir /: %m");
}
priv_basicset(priv);
(void) priv_delset(priv, PRIV_PROC_EXEC);
(void) priv_delset(priv, PRIV_PROC_FORK);
(void) priv_delset(priv, PRIV_PROC_INFO);
(void) priv_delset(priv, PRIV_PROC_SESSION);
(void) priv_delset(priv, PRIV_FILE_LINK_ANY);
if ((priv_addset(priv, PRIV_PROC_AUDIT) != 0) ||
(setppriv(PRIV_SET, PRIV_PERMITTED, priv) != 0)) {
syslog(LOG_AUTH | LOG_ALERT,
"login audit_logout: could not reduce privs: %m");
}
closefrom(0);
priv_freeset(priv);
while (pid != waitpid(pid, &status, 0))
continue;
(void) adt_put_event(logout, ADT_SUCCESS, ADT_SUCCESS);
adt_free_event(logout);
(void) adt_end_session(ah);
exit(WEXITSTATUS(status));
}
void
audit_failure(uint_t event_id, int failure_code, struct passwd *pwd,
const char *hostname, const char *ttyname, char *optional_text)
{
adt_session_data_t *ah;
adt_event_data_t *event;
uid_t uid;
gid_t gid;
adt_termid_t *p_tid;
if (adt_start_session(&ah, NULL, ADT_USE_PROC_DATA))
return;
uid = ADT_NO_ATTRIB;
gid = ADT_NO_ATTRIB;
if (pwd != NULL) {
uid = pwd->pw_uid;
gid = pwd->pw_gid;
}
if (*hostname == '\0')
(void) adt_load_ttyname(ttyname, &p_tid);
else
(void) adt_load_hostname(hostname, &p_tid);
if (adt_set_user(ah, uid, gid, uid, gid, p_tid, ADT_NEW)) {
(void) adt_end_session(ah);
if (p_tid != NULL)
free(p_tid);
return;
}
if (p_tid != NULL)
free(p_tid);
event = adt_alloc_event(ah, event_id);
if (event == NULL) {
return;
}
switch (event_id) {
case ADT_zlogin:
event->adt_zlogin.message = optional_text;
break;
}
(void) adt_put_event(event, ADT_FAILURE, failure_code);
adt_free_event(event);
(void) adt_end_session(ah);
}