Commit ea91bb68 authored by Sergei Golubchik's avatar Sergei Golubchik

MDEV-10361 Crash in pam_securid.so with auth_pam connecting from SQLyog

auth_pam: debug output
parent d0d99dec
...@@ -45,6 +45,8 @@ loose-feedback-debug-startup-interval=20 ...@@ -45,6 +45,8 @@ loose-feedback-debug-startup-interval=20
loose-feedback-debug-first-interval=60 loose-feedback-debug-first-interval=60
loose-feedback-debug-interval=60 loose-feedback-debug-interval=60
loose-pam-debug
loose-innodb_data_file_path= ibdata1:12M:autoextend loose-innodb_data_file_path= ibdata1:12M:autoextend
loose-innodb_buffer_pool_size= 8M loose-innodb_buffer_pool_size= 8M
loose-innodb_lru_scan_depth= 100 loose-innodb_lru_scan_depth= 100
......
...@@ -2,7 +2,7 @@ install plugin pam soname 'auth_pam.so'; ...@@ -2,7 +2,7 @@ install plugin pam soname 'auth_pam.so';
create user test_pam identified via pam using 'mariadb_mtr'; create user test_pam identified via pam using 'mariadb_mtr';
create user pam_test; create user pam_test;
grant proxy on pam_test to test_pam; grant proxy on pam_test to test_pam;
show variables like 'pam%'; show variables like 'pam_use_%';
Variable_name Value Variable_name Value
pam_use_cleartext_plugin ON pam_use_cleartext_plugin ON
drop user test_pam; drop user test_pam;
......
--source pam_init.inc --source pam_init.inc
show variables like 'pam%'; show variables like 'pam_use_%';
--error 1 --error 1
--exec echo FAIL | $MYSQL_TEST -u test_pam --plugin-dir=$plugindir --exec echo FAIL | $MYSQL_TEST -u test_pam --plugin-dir=$plugindir
......
...@@ -17,6 +17,7 @@ ...@@ -17,6 +17,7 @@
#define _GNU_SOURCE 1 /* for strndup */ #define _GNU_SOURCE 1 /* for strndup */
#include <mysql/plugin_auth.h> #include <mysql/plugin_auth.h>
#include <stdio.h>
#include <string.h> #include <string.h>
#include <security/pam_appl.h> #include <security/pam_appl.h>
#include <security/pam_modules.h> #include <security/pam_modules.h>
...@@ -44,6 +45,13 @@ char *strndup(const char *from, size_t length) ...@@ -44,6 +45,13 @@ char *strndup(const char *from, size_t length)
} }
#endif #endif
#ifndef DBUG_OFF
static char pam_debug = 0;
#define PAM_DEBUG(X) do { if (pam_debug) { fprintf X; } } while(0)
#else
#define PAM_DEBUG(X) /* no-op */
#endif
static int conv(int n, const struct pam_message **msg, static int conv(int n, const struct pam_message **msg,
struct pam_response **resp, void *data) struct pam_response **resp, void *data)
{ {
...@@ -91,12 +99,17 @@ static int conv(int n, const struct pam_message **msg, ...@@ -91,12 +99,17 @@ static int conv(int n, const struct pam_message **msg,
4 means "password-like input, echo disabled" 4 means "password-like input, echo disabled"
C'est la vie. */ C'est la vie. */
param->buf[0] = msg[i]->msg_style == PAM_PROMPT_ECHO_ON ? 2 : 4; param->buf[0] = msg[i]->msg_style == PAM_PROMPT_ECHO_ON ? 2 : 4;
PAM_DEBUG((stderr, "PAM: conv: send(%.*s)\n", (int)(param->ptr - param->buf - 1), param->buf));
if (param->vio->write_packet(param->vio, param->buf, param->ptr - param->buf - 1)) if (param->vio->write_packet(param->vio, param->buf, param->ptr - param->buf - 1))
return PAM_CONV_ERR; return PAM_CONV_ERR;
pkt_len = param->vio->read_packet(param->vio, &pkt); pkt_len = param->vio->read_packet(param->vio, &pkt);
if (pkt_len < 0) if (pkt_len < 0)
{
PAM_DEBUG((stderr, "PAM: conv: recv() ERROR\n"));
return PAM_CONV_ERR; return PAM_CONV_ERR;
}
PAM_DEBUG((stderr, "PAM: conv: recv(%.*s)\n", pkt_len, pkt));
/* allocate and copy the reply to the response array */ /* allocate and copy the reply to the response array */
if (!((*resp)[i].resp= strndup((char*) pkt, pkt_len))) if (!((*resp)[i].resp= strndup((char*) pkt, pkt_len)))
return PAM_CONV_ERR; return PAM_CONV_ERR;
...@@ -134,9 +147,16 @@ static int pam_auth(MYSQL_PLUGIN_VIO *vio, MYSQL_SERVER_AUTH_INFO *info) ...@@ -134,9 +147,16 @@ static int pam_auth(MYSQL_PLUGIN_VIO *vio, MYSQL_SERVER_AUTH_INFO *info)
param.ptr = param.buf + 1; param.ptr = param.buf + 1;
param.vio = vio; param.vio = vio;
PAM_DEBUG((stderr, "PAM: pam_start(%s, %s)\n", service, info->user_name));
DO( pam_start(service, info->user_name, &pam_start_arg, &pamh) ); DO( pam_start(service, info->user_name, &pam_start_arg, &pamh) );
PAM_DEBUG((stderr, "PAM: pam_authenticate(0)\n"));
DO( pam_authenticate (pamh, 0) ); DO( pam_authenticate (pamh, 0) );
PAM_DEBUG((stderr, "PAM: pam_acct_mgmt(0)\n"));
DO( pam_acct_mgmt(pamh, 0) ); DO( pam_acct_mgmt(pamh, 0) );
PAM_DEBUG((stderr, "PAM: pam_get_item(PAM_USER)\n"));
DO( pam_get_item(pamh, PAM_USER, (pam_get_item_3_arg) &new_username) ); DO( pam_get_item(pamh, PAM_USER, (pam_get_item_3_arg) &new_username) );
if (new_username && strcmp(new_username, info->user_name)) if (new_username && strcmp(new_username, info->user_name))
...@@ -145,6 +165,7 @@ static int pam_auth(MYSQL_PLUGIN_VIO *vio, MYSQL_SERVER_AUTH_INFO *info) ...@@ -145,6 +165,7 @@ static int pam_auth(MYSQL_PLUGIN_VIO *vio, MYSQL_SERVER_AUTH_INFO *info)
end: end:
pam_end(pamh, status); pam_end(pamh, status);
PAM_DEBUG((stderr, "PAM: status = %d user = %s\n", status, new_username));
return status == PAM_SUCCESS ? CR_OK : CR_ERROR; return status == PAM_SUCCESS ? CR_OK : CR_ERROR;
} }
...@@ -163,8 +184,17 @@ static MYSQL_SYSVAR_BOOL(use_cleartext_plugin, use_cleartext_plugin, ...@@ -163,8 +184,17 @@ static MYSQL_SYSVAR_BOOL(use_cleartext_plugin, use_cleartext_plugin,
"supports simple PAM policies that don't require anything besides " "supports simple PAM policies that don't require anything besides "
"a password", NULL, NULL, 0); "a password", NULL, NULL, 0);
#ifndef DBUG_OFF
static MYSQL_SYSVAR_BOOL(debug, pam_debug, PLUGIN_VAR_OPCMDARG,
"Log all PAM activity", NULL, NULL, 0);
#endif
static struct st_mysql_sys_var* vars[] = { static struct st_mysql_sys_var* vars[] = {
MYSQL_SYSVAR(use_cleartext_plugin), MYSQL_SYSVAR(use_cleartext_plugin),
#ifndef DBUG_OFF
MYSQL_SYSVAR(debug),
#endif
NULL NULL
}; };
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment