* syscalls.cc (seteuid): Set environment variables USERNAME and

USERDOMAIN before impersonation to workaround a LookupAccountSid()
        misbehaviour.
        * uinfo.cc (internal_getlogin): Revert most of the previous change.
        Don't set environment variables USERNAME and USERDOMAIN. That's
        the job of seteuid() now. Try to get logon server from Lsa
        only if logon server isn't already known.
This commit is contained in:
Corinna Vinschen 2001-06-09 21:25:55 +00:00
parent 41476ab0bd
commit d4217d5680
3 changed files with 184 additions and 83 deletions

View File

@ -1,3 +1,13 @@
Sat Jun 9 23:20:00 2001 Corinna Vinschen <corinna@vinschen.de>
* syscalls.cc (seteuid): Set environment variables USERNAME and
USERDOMAIN before impersonation to workaround a LookupAccountSid()
misbehaviour.
* uinfo.cc (internal_getlogin): Revert most of the previous change.
Don't set environment variables USERNAME and USERDOMAIN. That's
the job of seteuid() now. Try to get logon server from Lsa
only if logon server isn't already known.
Thu Jun 7 15:54:32 2001 Robert Collins <rbtcollins@hotmail.com> Thu Jun 7 15:54:32 2001 Robert Collins <rbtcollins@hotmail.com>
* thread.cc (pthread_cond::Broadcast): Don't print error messages on * thread.cc (pthread_cond::Broadcast): Don't print error messages on

View File

@ -22,6 +22,7 @@ details. */
#include <errno.h> #include <errno.h>
#include <limits.h> #include <limits.h>
#include <winnls.h> #include <winnls.h>
#include <wininet.h>
#include <lmcons.h> /* for UNLEN */ #include <lmcons.h> /* for UNLEN */
#include <cygwin/version.h> #include <cygwin/version.h>
#include <sys/cygwin.h> #include <sys/cygwin.h>
@ -1971,6 +1972,14 @@ seteuid (uid_t uid)
sigframe thisframe (mainthread); sigframe thisframe (mainthread);
if (os_being_run == winNT) if (os_being_run == winNT)
{ {
char orig_username[UNLEN + 1];
char orig_domain[INTERNET_MAX_HOST_NAME_LENGTH + 1];
char username[UNLEN + 1];
DWORD ulen = UNLEN + 1;
char domain[INTERNET_MAX_HOST_NAME_LENGTH + 1];
DWORD dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
SID_NAME_USE use;
if (uid == (uid_t) -1 || uid == myself->uid) if (uid == (uid_t) -1 || uid == myself->uid)
{ {
debug_printf ("new euid == current euid, nothing happens"); debug_printf ("new euid == current euid, nothing happens");
@ -1983,18 +1992,44 @@ seteuid (uid_t uid)
return -1; return -1;
} }
cygsid tok_usersid;
DWORD siz;
char *env;
orig_username[0] = orig_domain[0] = '\0';
if ((env = getenv ("USERNAME")))
strncat (orig_username, env, UNLEN + 1);
if ((env = getenv ("USERDOMAIN")))
strncat (orig_domain, env, INTERNET_MAX_HOST_NAME_LENGTH + 1);
if (uid == cygheap->user.orig_uid) if (uid == cygheap->user.orig_uid)
{ {
debug_printf ("RevertToSelf () (uid == orig_uid, token=%d)", debug_printf ("RevertToSelf () (uid == orig_uid, token=%d)",
cygheap->user.token); cygheap->user.token);
RevertToSelf (); RevertToSelf ();
if (cygheap->user.token != INVALID_HANDLE_VALUE) if (cygheap->user.token != INVALID_HANDLE_VALUE)
cygheap->user.impersonated = FALSE; cygheap->user.impersonated = FALSE;
HANDLE ptok = INVALID_HANDLE_VALUE;
if (!OpenProcessToken (GetCurrentProcess (), TOKEN_QUERY, &ptok))
debug_printf ("OpenProcessToken(): %E\n");
else if (!GetTokenInformation (ptok, TokenUser, &tok_usersid,
sizeof tok_usersid, &siz))
debug_printf ("GetTokenInformation(): %E");
else if (!LookupAccountSid (NULL, tok_usersid, username, &ulen,
domain, &dlen, &use))
debug_printf ("LookupAccountSid(): %E");
else
{
setenv ("USERNAME", username, 1);
setenv ("USERDOMAIN", domain, 1);
}
if (ptok != INVALID_HANDLE_VALUE)
CloseHandle (ptok);
} }
else else
{ {
cygsid usersid, pgrpsid, tok_usersid, tok_pgrpsid; cygsid usersid, pgrpsid, tok_pgrpsid;
DWORD siz;
HANDLE sav_token = INVALID_HANDLE_VALUE; HANDLE sav_token = INVALID_HANDLE_VALUE;
BOOL sav_impersonation; BOOL sav_impersonation;
BOOL current_token_is_internal_token = FALSE; BOOL current_token_is_internal_token = FALSE;
@ -2104,11 +2139,18 @@ seteuid (uid_t uid)
} }
/* Now try to impersonate. */ /* Now try to impersonate. */
if (!ImpersonateLoggedOnUser (cygheap->user.token)) if (!LookupAccountSid (NULL, usersid, username, &ulen,
domain, &dlen, &use))
debug_printf ("LookupAccountSid (): %E");
else if (!ImpersonateLoggedOnUser (cygheap->user.token))
system_printf ("Impersonating (%d) in set(e)uid failed: %E", system_printf ("Impersonating (%d) in set(e)uid failed: %E",
cygheap->user.token); cygheap->user.token);
else else
{
cygheap->user.impersonated = TRUE; cygheap->user.impersonated = TRUE;
setenv ("USERNAME", username, 1);
setenv ("USERDOMAIN", domain, 1);
}
} }
} }
@ -2124,6 +2166,8 @@ seteuid (uid_t uid)
debug_printf ("Diffs!!! token: %d, cur: %d, new: %d, orig: %d", debug_printf ("Diffs!!! token: %d, cur: %d, new: %d, orig: %d",
cygheap->user.token, pw_cur->pw_uid, cygheap->user.token, pw_cur->pw_uid,
pw_new->pw_uid, cygheap->user.orig_uid); pw_new->pw_uid, cygheap->user.orig_uid);
setenv ("USERNAME", orig_username, 1);
setenv ("USERDOMAIN", orig_domain, 1);
set_errno (EPERM); set_errno (EPERM);
return -1; return -1;
} }

View File

@ -31,61 +31,61 @@ struct passwd *
internal_getlogin (cygheap_user &user) internal_getlogin (cygheap_user &user)
{ {
char username[UNLEN + 1]; char username[UNLEN + 1];
DWORD ulen = UNLEN + 1; DWORD username_len = UNLEN + 1;
struct passwd *pw = NULL; struct passwd *pw = NULL;
if (!GetUserName (username, &ulen)) if (!GetUserName (username, &username_len))
user.set_name ("unknown"); user.set_name ("unknown");
else else
user.set_name (username); user.set_name (username);
debug_printf ("GetUserName() = %s", user.name ());
if (os_being_run == winNT) if (os_being_run == winNT)
{ {
HANDLE ptok = user.token; /* Which is INVALID_HANDLE_VALUE if no LPWKSTA_USER_INFO_1 wui;
impersonation took place. */ NET_API_STATUS ret;
DWORD siz; char buf[512];
cygsid tu; char *env;
NET_API_STATUS ret = 0;
char domain[INTERNET_MAX_HOST_NAME_LENGTH + 1];
DWORD dlen = INTERNET_MAX_HOST_NAME_LENGTH + 1;
SID_NAME_USE use;
char buf[MAX_PATH];
/* Try to get the SID either from already impersonated token user.set_logsrv (NULL);
or from current process first. To differ that two cases is /* First trying to get logon info from environment */
important, because you can't rely on the user information if ((env = getenv ("USERNAME")) != NULL)
in a process token of a currently impersonated process. */ user.set_name (env);
user.set_sid (NO_SID); if ((env = getenv ("USERDOMAIN")) != NULL)
if (ptok == INVALID_HANDLE_VALUE user.set_domain (env);
&& !OpenProcessToken (GetCurrentProcess (), if ((env = getenv ("LOGONSERVER")) != NULL)
TOKEN_ADJUST_DEFAULT | TOKEN_QUERY, user.set_logsrv (env + 2); /* filter leading double backslashes */
&ptok)) if (user.name () && user.domain ())
debug_printf ("OpenProcessToken(): %E"); debug_printf ("User: %s, Domain: %s, Logon Server: %s",
else if (!GetTokenInformation (ptok, TokenUser, &tu, sizeof tu, &siz)) user.name (), user.domain (), user.logsrv ());
debug_printf ("GetTokenInformation(): %E"); else if (!(ret = NetWkstaUserGetInfo (NULL, 1, (LPBYTE *)&wui)))
else if (!(ret = user.set_sid (tu)))
debug_printf ("Couldn't retrieve SID from access token!");
else if (!LookupAccountSid (NULL, user.sid (), username, &ulen,
domain, &dlen, &use))
debug_printf ("LookupAccountSid (): %E");
else
{ {
user.set_name (username); sys_wcstombs (buf, wui->wkui1_username, UNLEN + 1);
user.set_domain (domain); user.set_name (buf);
sys_wcstombs (buf, wui->wkui1_logon_server,
INTERNET_MAX_HOST_NAME_LENGTH + 1);
user.set_logsrv (buf);
sys_wcstombs (buf, wui->wkui1_logon_domain,
INTERNET_MAX_HOST_NAME_LENGTH + 1);
user.set_domain (buf);
NetApiBufferFree (wui);
} }
if (get_logon_server_and_user_domain (domain, NULL)) if (!user.logsrv () && get_logon_server_and_user_domain (buf, NULL))
user.set_logsrv (domain + 2); {
setenv ("USERNAME", user.name (), 1); user.set_logsrv (buf + 2);
setenv ("LOGONSERVER", user.logsrv (), 1); setenv ("LOGONSERVER", buf, 1);
setenv ("USERDOMAIN", user.domain (), 1); }
LPUSER_INFO_3 ui = NULL;
LPUSER_INFO_3 ui;
WCHAR wlogsrv[INTERNET_MAX_HOST_NAME_LENGTH + 1];
WCHAR wuser[UNLEN + 1]; WCHAR wuser[UNLEN + 1];
sys_mbstowcs (wlogsrv, user.logsrv (), INTERNET_MAX_HOST_NAME_LENGTH + 1); WCHAR wlogsrv[INTERNET_MAX_HOST_NAME_LENGTH + 3];
/* HOMEDRIVE and HOMEPATH are wrong most of the time, too,
after changing user context! */
sys_mbstowcs (wuser, user.name (), UNLEN + 1); sys_mbstowcs (wuser, user.name (), UNLEN + 1);
if (!NetUserGetInfo (wlogsrv, wuser, 3, (LPBYTE *)&ui) || strcat (strcpy (buf, "\\\\"), user.logsrv ());
!NetUserGetInfo (NULL, wuser, 3, (LPBYTE *)&ui)) sys_mbstowcs (wlogsrv, buf, INTERNET_MAX_HOST_NAME_LENGTH + 3);
if (!NetUserGetInfo (NULL, wuser, 3, (LPBYTE *)&ui)
|| !NetUserGetInfo (wlogsrv, wuser, 3,(LPBYTE *)&ui))
{ {
sys_wcstombs (buf, ui->usri3_home_dir, MAX_PATH); sys_wcstombs (buf, ui->usri3_home_dir, MAX_PATH);
if (!buf[0]) if (!buf[0])
@ -95,7 +95,7 @@ internal_getlogin (cygheap_user &user)
strcat (buf, "\\"); strcat (buf, "\\");
else else
{ {
char *env = getenv ("SYSTEMDRIVE"); env = getenv ("SYSTEMDRIVE");
if (env && *env) if (env && *env)
strcat (strcpy (buf, env), "\\"); strcat (strcpy (buf, env), "\\");
else else
@ -107,12 +107,53 @@ internal_getlogin (cygheap_user &user)
setenv ("HOMEDRIVE", buf, 1); setenv ("HOMEDRIVE", buf, 1);
NetApiBufferFree (ui); NetApiBufferFree (ui);
} }
debug_printf ("Domain: %s, Logon Server: %s, Windows Username: %s",
user.domain (), user.logsrv (), user.name ());
if (allow_ntsec)
{
HANDLE ptok = user.token; /* Which is INVALID_HANDLE_VALUE if no
impersonation took place. */
DWORD siz;
cygsid tu;
int ret = 0;
/* Try to get the SID either from already impersonated token
or from current process first. To differ that two cases is
important, because you can't rely on the user information
in a process token of a currently impersonated process. */
if (ptok == INVALID_HANDLE_VALUE
&& !OpenProcessToken (GetCurrentProcess (),
TOKEN_ADJUST_DEFAULT | TOKEN_QUERY,
&ptok))
debug_printf ("OpenProcessToken(): %E\n");
else if (!GetTokenInformation (ptok, TokenUser, &tu, sizeof tu, &siz))
debug_printf ("GetTokenInformation(): %E");
else if (!(ret = user.set_sid (tu)))
debug_printf ("Couldn't retrieve SID from access token!");
/* If that failes, try to get the SID from localhost. This can only
be done if a domain is given because there's a chance that a local
and a domain user may have the same name. */
if (!ret && user.domain ())
{
/* Concat DOMAIN\USERNAME for the next lookup */
strcat (strcat (strcpy (buf, user.domain ()), "\\"), user.name ());
if (!(ret = lookup_name (buf, NULL, user.sid ())))
debug_printf ("Couldn't retrieve SID locally!");
}
/* If that fails, too, as a last resort try to get the SID from
the logon server. */
if (!ret && !(ret = lookup_name (user.name (), user.logsrv (),
user.sid ())))
debug_printf ("Couldn't retrieve SID from '%s'!", user.logsrv ());
/* If we have a SID, try to get the corresponding Cygwin user name /* If we have a SID, try to get the corresponding Cygwin user name
which can be different from the Windows user name. */ which can be different from the Windows user name. */
cygsid gsid (NO_SID); cygsid gsid (NO_SID);
if (user.sid ()) if (ret)
{ {
char dom[INTERNET_MAX_HOST_NAME_LENGTH + 1];
cygsid psid; cygsid psid;
for (int pidx = 0; (pw = internal_getpwent (pidx)); ++pidx) for (int pidx = 0; (pw = internal_getpwent (pidx)); ++pidx)
@ -120,15 +161,20 @@ internal_getlogin (cygheap_user &user)
{ {
user.set_name (pw->pw_name); user.set_name (pw->pw_name);
struct group *gr = getgrgid (pw->pw_gid); struct group *gr = getgrgid (pw->pw_gid);
if (gr && !gsid.getfromgr (gr)) if (gr)
if (!gsid.getfromgr (gr))
gsid = NO_SID; gsid = NO_SID;
break;
} }
if (!strcasematch (user.name (), "SYSTEM")) if (!strcasematch (user.name (), "SYSTEM")
&& user.domain () && user.logsrv ())
{
if (get_registry_hive_path (user.sid (), buf)) if (get_registry_hive_path (user.sid (), buf))
setenv ("USERPROFILE", buf, 1); setenv ("USERPROFILE", buf, 1);
else else
unsetenv ("USERPROFILE"); unsetenv ("USERPROFILE");
} }
}
/* If this process is started from a non Cygwin process, /* If this process is started from a non Cygwin process,
set token owner to the same value as token user and set token owner to the same value as token user and
@ -148,6 +194,7 @@ internal_getlogin (cygheap_user &user)
&& user.token == INVALID_HANDLE_VALUE) && user.token == INVALID_HANDLE_VALUE)
CloseHandle (ptok); CloseHandle (ptok);
} }
}
debug_printf ("Cygwins Username: %s", user.name ()); debug_printf ("Cygwins Username: %s", user.name ());
return pw ?: getpwnam(user.name ()); return pw ?: getpwnam(user.name ());
} }