Skip to content

Commit

Permalink
RANGER-842: modified to create a separate module for PAM credential v…
Browse files Browse the repository at this point in the history
…alidation

Signed-off-by: rmani <[email protected]>
  • Loading branch information
sneethiraj authored and rmani committed Jul 11, 2016
1 parent 42d8db5 commit 5ba4831
Show file tree
Hide file tree
Showing 9 changed files with 219 additions and 66 deletions.
1 change: 1 addition & 0 deletions LICENSE.txt
Original file line number Diff line number Diff line change
Expand Up @@ -245,6 +245,7 @@ This product includes Block UI v1.1.1 (https://github.com/dreamerslab/jquery.msg
This product includes Sizzle (http://sizzlejs.com/ - MIT license), Copyright 2005, 2013 jQuery Foundation, Inc. and other contributors
This product includes ES5 15.5.4.20 (https://github.com/kriskowal/es5-shim - MIT license), Copyright 2009, 2010 Kristopher Michael Kowal.
This product includes PURE CSS GUI ICONS 1.0.1(http://nicolasgallagher.com/pure-css-gui-icons/ - Dual licensed under MIT and GNU GPLv2), by Nicolas Gallagher
This product includes libpam4j 1.8 (https://github.com/kohsuke/libpam4j - MIT license), Copyright Kohsuke Kawaguchi.



Expand Down
15 changes: 15 additions & 0 deletions pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -187,6 +187,7 @@
<kafka.version>0.10.0.0</kafka.version>
<kms.httpcomponents.httpclient.version>4.3.6</kms.httpcomponents.httpclient.version>
<knox.gateway.version>0.6.0</knox.gateway.version>
<libpam4j.version>1.8</libpam4j.version>
<local.lib.dir>${project.basedir}/../lib/local</local.lib.dir>
<log4j.version>1.2.17</log4j.version>
<metrics.core.version>3.0.2</metrics.core.version>
Expand Down Expand Up @@ -238,6 +239,20 @@
<module>unixauthnative</module>
</modules>
</profile>
<profile>
<id>linux-pam</id>
<activation>
<os>
<family>linux</family>
</os>
<file>
<exists>/usr/include/security/pam_appl.h</exists>
</file>
</activation>
<modules>
<module>unixauthpam</module>
</modules>
</profile>
</profiles>
<distributionManagement>
<repository>
Expand Down
9 changes: 9 additions & 0 deletions src/main/assembly/usersync.xml
Original file line number Diff line number Diff line change
Expand Up @@ -120,6 +120,15 @@
<include>credValidator.*</include>
</includes>
</fileSet>
<fileSet>
<directoryMode>755</directoryMode>
<fileMode>755</fileMode>
<outputDirectory>/native</outputDirectory>
<directory>unixauthpam/target</directory>
<includes>
<include>pamCredValidator.*</include>
</includes>
</fileSet>
<fileSet>
<directoryMode>755</directoryMode>
<outputDirectory>/</outputDirectory>
Expand Down
2 changes: 1 addition & 1 deletion unixauthnative/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@
</source>
</sources>
<linkerEndOptions>
<linkerEndOption>-lpam</linkerEndOption>
<linkerEndOption>-lcrypt</linkerEndOption>
</linkerEndOptions>
</configuration>
</plugin>
Expand Down
89 changes: 24 additions & 65 deletions unixauthnative/src/main/c/credValidator.c
Original file line number Diff line number Diff line change
Expand Up @@ -14,91 +14,50 @@
* See the License for the specific language governing permissions and
* limitations under the License.
*/

/*
You need to add the following (or equivalent) to the
/etc/pam.d/ranger-remote file:
# check authorization
auth required pam_unix.so
account required pam_unix.so
*/

#include <stdio.h>
#include <stdarg.h>
#include <unistd.h>
#include <stdlib.h>
#include <pwd.h>
#include <shadow.h>
#include <string.h>
#include <sys/types.h>
#include <security/pam_appl.h>

int pamconv(int num_msg, const struct pam_message **msg, struct pam_response **resp, void *appdata_ptr) {
if (num_msg != 1 || msg[0]->msg_style != PAM_PROMPT_ECHO_OFF) {
fprintf(stderr, "ERROR: Unexpected PAM conversation '%d/%s'\n", msg[0]->msg_style, msg[0]->msg);
return PAM_CONV_ERR;
}
if (!appdata_ptr) {
fprintf(stderr, "ERROR: No password available to conversation!\n");
return PAM_CONV_ERR;
}
*resp = calloc(num_msg, sizeof(struct pam_response));
if (!*resp) {
fprintf(stderr, "ERROR: Out of memory!\n");
return PAM_CONV_ERR;
}
(*resp)[0].resp = strdup((char *) appdata_ptr);
(*resp)[0].resp_retcode = 0;

return ((*resp)[0].resp ? PAM_SUCCESS : PAM_CONV_ERR);
}

struct pam_conv conv = { pamconv, NULL };
#include <crypt.h>

int main(int ac, char **av, char **ev)
{
char username[64] ;
char password[64] ;
char line[512] ;

int retval;
pam_handle_t *pamh = NULL;
struct passwd *pwp;
struct spwd *spwd ;

fgets(line,512,stdin) ;
sscanf(line, "LOGIN:%s %s",username,password) ;
conv.appdata_ptr = (char *) password;

retval = pam_start("ranger-remote", username, &conv, &pamh);
if (retval != PAM_SUCCESS) {
/* why expose this? */
fprintf(stdout, "FAILED: [%s] does not exists.\n", username) ;
exit(1);
}
sscanf(line, "LOGIN:%s %s",username,password) ;

retval = pam_authenticate(pamh, 0);
if (retval != PAM_SUCCESS) {
fprintf(stdout, "FAILED: Password did not match.\n") ;
exit(1);
}
pwp = getpwnam(username) ;

/* authorize */
retval = pam_acct_mgmt(pamh, 0);
if (retval != PAM_SUCCESS) {
fprintf(stdout, "FAILED: [%s] is not authorized.\n", username) ;
exit(1);
if (pwp == (struct passwd *)NULL) {
fprintf(stdout, "FAILED: [%s] does not exists.\n", username) ;
exit(1) ;
}

spwd = getspnam(pwp->pw_name) ;

/* establish the requested credentials */
if ((retval = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) {
fprintf(stdout, "FAILED: Error setting credentials for [%s].\n", username) ;
exit(1);
if (spwd == (struct spwd *)NULL) {
fprintf(stdout, "FAILED: unable to get (shadow) password for %s\n", username) ;
exit(1) ;
}

/* not opening a session, as logout has not been implemented as a remote service */
fprintf(stdout, "OK:\n") ;

if (pamh) {
pam_end(pamh, retval);
else {
char *gen = crypt(password,spwd->sp_pwdp) ;
if (strcmp(spwd->sp_pwdp,gen) == 0) {
fprintf(stdout, "OK:\n") ;
exit(0);
}
else {
fprintf(stdout, "FAILED: Password did not match.\n") ;
exit(1) ;
}
}

exit(0) ;
}
3 changes: 3 additions & 0 deletions unixauthpam/.gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
/target/
/bin/
.settings/
55 changes: 55 additions & 0 deletions unixauthpam/pom.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
<?xml version="1.0" encoding="UTF-8"?>
<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
<modelVersion>4.0.0</modelVersion>
<parent>
<groupId>org.apache.ranger</groupId>
<artifactId>ranger</artifactId>
<version>0.6.0-SNAPSHOT</version>
<relativePath>..</relativePath>
</parent>
<artifactId>pamCredValidator</artifactId>
<packaging>uexe</packaging>
<name>PAM Authenticator</name>
<description>PAM authentication service</description>
<build>
<plugins>
<plugin>
<groupId>org.codehaus.mojo</groupId>
<artifactId>native-maven-plugin</artifactId>
<extensions>true</extensions>
<configuration>
<compilerStartOptions>
<compilerStartOption>${commonCompilerOptions}</compilerStartOption>
</compilerStartOptions>
<sources>
<source>
<directory>src/main/c</directory>
<includes>
<include>**/*.c</include>
</includes>
</source>
</sources>
<linkerEndOptions>
<linkerEndOption>-lpam</linkerEndOption>
</linkerEndOptions>
</configuration>
</plugin>
</plugins>
</build>
</project>
104 changes: 104 additions & 0 deletions unixauthpam/src/main/c/pamCredValidator.c
Original file line number Diff line number Diff line change
@@ -0,0 +1,104 @@
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/

/*
You need to add the following (or equivalent) to the
/etc/pam.d/ranger-remote file:
# check authorization
auth required pam_unix.so
account required pam_unix.so
*/

#include <stdio.h>
#include <stdarg.h>
#include <unistd.h>
#include <stdlib.h>
#include <pwd.h>
#include <string.h>
#include <sys/types.h>
#include <security/pam_appl.h>

int pamconv(int num_msg, const struct pam_message **msg, struct pam_response **resp, void *appdata_ptr) {
if (num_msg != 1 || msg[0]->msg_style != PAM_PROMPT_ECHO_OFF) {
fprintf(stderr, "ERROR: Unexpected PAM conversation '%d/%s'\n", msg[0]->msg_style, msg[0]->msg);
return PAM_CONV_ERR;
}
if (!appdata_ptr) {
fprintf(stderr, "ERROR: No password available to conversation!\n");
return PAM_CONV_ERR;
}
*resp = calloc(num_msg, sizeof(struct pam_response));
if (!*resp) {
fprintf(stderr, "ERROR: Out of memory!\n");
return PAM_CONV_ERR;
}
(*resp)[0].resp = strdup((char *) appdata_ptr);
(*resp)[0].resp_retcode = 0;

return ((*resp)[0].resp ? PAM_SUCCESS : PAM_CONV_ERR);
}

struct pam_conv conv = { pamconv, NULL };

int main(int ac, char **av, char **ev)
{
char username[64] ;
char password[64] ;
char line[512] ;

int retval;
pam_handle_t *pamh = NULL;

fgets(line,512,stdin) ;
sscanf(line, "LOGIN:%s %s",username,password) ;
conv.appdata_ptr = (char *) password;

retval = pam_start("ranger-remote", username, &conv, &pamh);
if (retval != PAM_SUCCESS) {
/* why expose this? */
fprintf(stdout, "FAILED: [%s] does not exists.\n", username) ;
exit(1);
}

retval = pam_authenticate(pamh, 0);
if (retval != PAM_SUCCESS) {
fprintf(stdout, "FAILED: Password did not match.\n") ;
exit(1);
}

/* authorize */
retval = pam_acct_mgmt(pamh, 0);
if (retval != PAM_SUCCESS) {
fprintf(stdout, "FAILED: [%s] is not authorized.\n", username) ;
exit(1);
}

/* establish the requested credentials */
if ((retval = pam_setcred(pamh, PAM_ESTABLISH_CRED)) != PAM_SUCCESS) {
fprintf(stdout, "FAILED: Error setting credentials for [%s].\n", username) ;
exit(1);
}

/* not opening a session, as logout has not been implemented as a remote service */
fprintf(stdout, "OK:\n") ;

if (pamh) {
pam_end(pamh, retval);
}

exit(0) ;
}
7 changes: 7 additions & 0 deletions unixauthservice/scripts/setup.py
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,7 @@
#ugsyncLogFolderName = join(logFolderName, 'usersync')
nativeAuthFolderName = join(installPropDirName, 'native')
nativeAuthProgramName = join(nativeAuthFolderName, 'credValidator.uexe')
pamAuthProgramName = join(nativeAuthFolderName, 'pamCredValidator.uexe')
usersyncBaseDirFullName = join(rangerBaseDirName, usersyncBaseDirName)
confFolderName = join(usersyncBaseDirFullName, confBaseDirName)
localConfFolderName = join(installPropDirName, confBaseDirName)
Expand Down Expand Up @@ -489,6 +490,12 @@ def main():
else:
print "WARNING: Unix Authentication Program (%s) is not available for setting chmod(4550), chown(%s:%s) " % (nativeAuthProgramName, "root", groupName)

if isfile(pamAuthProgramName):
os.chown(pamAuthProgramName, rootOwnerId, groupId)
os.chmod(pamAuthProgramName, 04555)
else:
print "WARNING: Unix Authentication Program (%s) is not available for setting chmod(4550), chown(%s:%s) " % (pamAuthProgramName, "root", groupName)

write_env_files("logdir", logFolderName, ENV_LOGDIR_FILE);
write_env_files("RANGER_USERSYNC_HADOOP_CONF_DIR", hadoop_conf, ENV_HADOOP_CONF_FILE);
os.chown(os.path.join(confBaseDirName, ENV_LOGDIR_FILE),ownerId,groupId)
Expand Down

0 comments on commit 5ba4831

Please sign in to comment.