mirror of
https://github.com/freebsd/freebsd-src
synced 2024-10-15 04:43:53 +00:00
Apply class-imposed login restrictions.
Sponsored by: DARPA, NAI Labs
This commit is contained in:
parent
382d19ee61
commit
5b400a39b8
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=99053
|
@ -24,6 +24,7 @@
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: auth2.c,v 1.93 2002/05/31 11:35:15 markus Exp $");
|
RCSID("$OpenBSD: auth2.c,v 1.93 2002/05/31 11:35:15 markus Exp $");
|
||||||
|
RCSID("$FreeBSD$");
|
||||||
|
|
||||||
#include "ssh2.h"
|
#include "ssh2.h"
|
||||||
#include "xmalloc.h"
|
#include "xmalloc.h"
|
||||||
|
@ -137,6 +138,13 @@ input_userauth_request(int type, u_int32_t seq, void *ctxt)
|
||||||
Authmethod *m = NULL;
|
Authmethod *m = NULL;
|
||||||
char *user, *service, *method, *style = NULL;
|
char *user, *service, *method, *style = NULL;
|
||||||
int authenticated = 0;
|
int authenticated = 0;
|
||||||
|
#ifdef HAVE_LOGIN_CAP
|
||||||
|
login_cap_t *lc;
|
||||||
|
const char *from_host, *from_ip;
|
||||||
|
|
||||||
|
from_host = get_canonical_hostname(options.verify_reverse_mapping);
|
||||||
|
from_ip = get_remote_ipaddr();
|
||||||
|
#endif
|
||||||
|
|
||||||
if (authctxt == NULL)
|
if (authctxt == NULL)
|
||||||
fatal("input_userauth_request: no authctxt");
|
fatal("input_userauth_request: no authctxt");
|
||||||
|
@ -178,6 +186,27 @@ input_userauth_request(int type, u_int32_t seq, void *ctxt)
|
||||||
"(%s,%s) -> (%s,%s)",
|
"(%s,%s) -> (%s,%s)",
|
||||||
authctxt->user, authctxt->service, user, service);
|
authctxt->user, authctxt->service, user, service);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef HAVE_LOGIN_CAP
|
||||||
|
if (authctxt->pw != NULL) {
|
||||||
|
lc = login_getpwclass(authctxt->pw);
|
||||||
|
if (lc == NULL)
|
||||||
|
lc = login_getclassbyname(NULL, authctxt->pw);
|
||||||
|
if (!auth_hostok(lc, from_host, from_ip)) {
|
||||||
|
log("Denied connection for %.200s from %.200s [%.200s].",
|
||||||
|
authctxt->pw->pw_name, from_host, from_ip);
|
||||||
|
packet_disconnect("Sorry, you are not allowed to connect.");
|
||||||
|
}
|
||||||
|
if (!auth_timeok(lc, time(NULL))) {
|
||||||
|
log("LOGIN %.200s REFUSED (TIME) FROM %.200s",
|
||||||
|
authctxt->pw->pw_name, from_host);
|
||||||
|
packet_disconnect("Logins not available right now.");
|
||||||
|
}
|
||||||
|
login_close(lc);
|
||||||
|
lc = NULL;
|
||||||
|
}
|
||||||
|
#endif /* HAVE_LOGIN_CAP */
|
||||||
|
|
||||||
/* reset state */
|
/* reset state */
|
||||||
auth2_challenge_stop(authctxt);
|
auth2_challenge_stop(authctxt);
|
||||||
authctxt->postponed = 0;
|
authctxt->postponed = 0;
|
||||||
|
|
Loading…
Reference in a new issue