diff options
author | Matt Johnston <matt@ucc.asn.au> | 2012-05-09 22:37:04 +0800 |
---|---|---|
committer | Matt Johnston <matt@ucc.asn.au> | 2012-05-09 22:37:04 +0800 |
commit | 2713445e916325bad78a7f6b67eb264c503173d5 (patch) | |
tree | 2c1d1c068252c02a82b6c160c364ef56c3844f98 /svr-auth.c | |
parent | 1984aabc950904a9717735ae82b0bbf7d89d3478 (diff) |
Return immediate success for blank passwords if allowed
Diffstat (limited to 'svr-auth.c')
-rw-r--r-- | svr-auth.c | 37 |
1 files changed, 26 insertions, 11 deletions
@@ -141,15 +141,6 @@ void recv_msg_userauth_request() { dropbear_exit("unknown service in auth"); } - /* user wants to know what methods are supported */ - if (methodlen == AUTH_METHOD_NONE_LEN && - strncmp(methodname, AUTH_METHOD_NONE, - AUTH_METHOD_NONE_LEN) == 0) { - TRACE(("recv_msg_userauth_request: 'none' request")) - send_msg_userauth_failure(0, 0); - goto out; - } - /* check username is good before continuing */ if (checkusername(username, userlen) == DROPBEAR_FAILURE) { /* username is invalid/no shell/etc - send failure */ @@ -158,6 +149,31 @@ void recv_msg_userauth_request() { goto out; } + /* user wants to know what methods are supported */ + if (methodlen == AUTH_METHOD_NONE_LEN && + strncmp(methodname, AUTH_METHOD_NONE, + AUTH_METHOD_NONE_LEN) == 0) { + TRACE(("recv_msg_userauth_request: 'none' request")) +#ifdef ALLOW_BLANK_PASSWORD + if (!svr_opts.noauthpass + && !(svr_opts.norootpass && ses.authstate.pw_uid == 0) + && ses.authstate.pw_passwd == '\0') + { + dropbear_log(LOG_NOTICE, + "Auth succeeded with blank password for '%s' from %s", + ses.authstate.pw_name, + svr_ses.addrstring); + send_msg_userauth_success(); + goto out; + } + else +#endif + { + send_msg_userauth_failure(0, 0); + goto out; + } + } + #ifdef ENABLE_SVR_PASSWORD_AUTH if (!svr_opts.noauthpass && !(svr_opts.norootpass && ses.authstate.pw_uid == 0) ) { @@ -205,8 +221,7 @@ out: } -/* Check that the username exists, has a non-empty password, and has a valid - * shell. +/* Check that the username exists and isn't disallowed (root), and has a valid shell. * returns DROPBEAR_SUCCESS on valid username, DROPBEAR_FAILURE on failure */ static int checkusername(unsigned char *username, unsigned int userlen) { |