Skip to content

Commit

Permalink
lib/chkname.c, src/: Strictly disallow really bad names
Browse files Browse the repository at this point in the history
Some names are bad, and some names are really bad.  '--badname' should
only allow the mildly bad ones, which we can handle.  Some names are too
bad, and it's not possible to deal with them.  Reject them
unconditionally.

Acked-by: Chris Hofstaedtler <[email protected]>
Cc: Marc 'Zugschlus' Haber <[email protected]>
Cc: Iker Pedrosa <[email protected]>
Cc: Serge Hallyn <[email protected]>
Signed-off-by: Alejandro Colomar <[email protected]>
  • Loading branch information
alejandro-colomar committed Feb 17, 2025
1 parent 77eb67d commit 02a2bb2
Show file tree
Hide file tree
Showing 5 changed files with 27 additions and 18 deletions.
37 changes: 23 additions & 14 deletions lib/chkname.c
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,8 @@
* true - OK
* false - bad name
* errors:
* EINVAL Invalid name characters or sequences
* EINVAL Invalid name
* EILSEQ Invalid name character sequence (acceptable with --badname)
* EOVERFLOW Name longer than maximum size
*/

Expand All @@ -31,8 +32,11 @@

#include "defines.h"
#include "chkname.h"
#include "string/ctype/strchrisascii/strchriscntrl.h"
#include "string/ctype/strisascii/strisdigit.h"
#include "string/strcmp/streq.h"
#include "string/strcmp/strcaseeq.h"
#include "string/strcmp/strprefix.h"


#ifndef LOGIN_NAME_MAX
Expand All @@ -59,6 +63,21 @@ login_name_max_size(void)
static bool
is_valid_name(const char *name)
{
if (streq(name, "")
|| streq(name, ".")
|| streq(name, "..")
|| strcaseeq(name, "none")
|| strcaseeq(name, "all")
|| strcaseeq(name, "except")
|| strprefix(name, "-")
|| strpbrk(name, " !\"#&*+,/:;@|~")
|| strchriscntrl(name)
|| strisdigit(name))
{
errno = EINVAL;
return false;
}

if (allow_bad_names) {
return true;
}
Expand All @@ -69,25 +88,15 @@ is_valid_name(const char *name)
*
* as a non-POSIX, extension, allow "$" as the last char for
* sake of Samba 3.x "add machine script"
*
* Also do not allow fully numeric names or just "." or "..".
*/

if (strisdigit(name)) {
errno = EINVAL;
return false;
}

if (streq(name, "") ||
streq(name, ".") ||
streq(name, "..") ||
!((*name >= 'a' && *name <= 'z') ||
if (!((*name >= 'a' && *name <= 'z') ||
(*name >= 'A' && *name <= 'Z') ||
(*name >= '0' && *name <= '9') ||
*name == '_' ||
*name == '.'))
{
errno = EINVAL;
errno = EILSEQ;
return false;
}

Expand All @@ -101,7 +110,7 @@ is_valid_name(const char *name)
streq(name, "$")
))
{
errno = EINVAL;
errno = EILSEQ;
return false;
}
}
Expand Down
2 changes: 1 addition & 1 deletion src/newusers.c
Original file line number Diff line number Diff line change
Expand Up @@ -390,7 +390,7 @@ static int add_user (const char *name, uid_t uid, gid_t gid)

/* Check if this is a valid user name */
if (!is_valid_user_name(name)) {
if (errno == EINVAL) {
if (errno == EILSEQ) {
fprintf(stderr,
_("%s: invalid user name '%s': use --badname to ignore\n"),
Prog, name);
Expand Down
2 changes: 1 addition & 1 deletion src/pwck.c
Original file line number Diff line number Diff line change
Expand Up @@ -475,7 +475,7 @@ static void check_pw_file (bool *errors, bool *changed)
*/

if (!is_valid_user_name(pwd->pw_name)) {
if (errno == EINVAL) {
if (errno == EILSEQ) {
printf(_("invalid user name '%s': use --badname to ignore\n"),
pwd->pw_name);
} else {
Expand Down
2 changes: 1 addition & 1 deletion src/useradd.c
Original file line number Diff line number Diff line change
Expand Up @@ -1536,7 +1536,7 @@ static void process_flags (int argc, char **argv)

user_name = argv[optind];
if (!is_valid_user_name(user_name)) {
if (errno == EINVAL) {
if (errno == EILSEQ) {
fprintf(stderr,
_("%s: invalid user name '%s': use --badname to ignore\n"),
Prog, user_name);
Expand Down
2 changes: 1 addition & 1 deletion src/usermod.c
Original file line number Diff line number Diff line change
Expand Up @@ -1118,7 +1118,7 @@ process_flags(int argc, char **argv)
/*@notreached@*/break;
case 'l':
if (!is_valid_user_name(optarg)) {
if (errno == EINVAL) {
if (errno == EILSEQ) {
fprintf(stderr,
_("%s: invalid user name '%s': use --badname to ignore\n"),
Prog, optarg);
Expand Down

0 comments on commit 02a2bb2

Please sign in to comment.