[kbd] [PATCH] vlock: allow sudo user to unlock his session
Mikhail Novosyolov
m.novosyolov at rosalinux.ru
Sat Aug 1 16:19:59 MSK 2020
https://github.com/legionus/kbd/pull/45
If a non-root user ran sth like "sudo -i" and vlock'ed from inside it,
then that user himself should be able to unlock his console.
[user at HP-Elite-7300 tmp]$ echo $LOGNAME
user
[user at HP-Elite-7300 tmp]$ sudo -i
root at HP-Elite-7300:~# echo $LOGNAME
root
root at HP-Elite-7300:~# echo $SUDO_USER
user
root at HP-Elite-7300:~#
Tested on rosa2019.1 + kbd 2.2.0 + this patch:
[root at rosa-2019 kbd]# su - user
[user at rosa-2019 ~]$ sudo -i
[sudo] password for user:
[root at rosa-2019 ~]# vlock
Данное устройство tty (console) не является виртуальной консолью.
Блокировка console установлена user.
Пароль:
[root at rosa-2019 ~]#
sudo root session was successfully unlocked with user's password.
[root at rosa-2019 ~]# unset SUDO_USER
[root at rosa-2019 ~]# vlock
Данное устройство tty (console) не является виртуальной консолью.
Блокировка console установлена root.
Пароль:
root password is requested without $SUDO_ENV.
Another vlock implementation [1, 2] does not check that UIDs match,
I do not see sense in this check, removing it to make what I want work.
[1] Another vlock implementation: https://github.com/WorMzy/vlock
[2] My similar patch for it: https://github.com/mikhailnov/vlock/commit/ba38d5d563cdfaad3b2f260248b3434c235a7afd
---
src/vlock/username.c | 17 +++++++++--------
1 file changed, 9 insertions(+), 8 deletions(-)
diff --git a/src/vlock/username.c b/src/vlock/username.c
index a26a148..4c6d295 100644
--- a/src/vlock/username.c
+++ b/src/vlock/username.c
@@ -40,17 +40,18 @@ get_username(void)
{
const char *name;
struct passwd *pw = 0;
+ char *logname = NULL;
uid_t uid = getuid();
- char *logname = getenv("LOGNAME");
+ /* If a non-root runs a sudo session, ask for user's
+ * password to unlock it, not root's password */
+ logname = getenv("SUDO_USER");
+ if (logname == NULL)
+ logname = getenv("LOGNAME");
- if (logname) {
- pw = getpwnam(logname);
- /* Ensure uid is same as current. */
- if (pw && pw->pw_uid != uid)
- pw = 0;
- }
- if (!pw)
+ pw = getpwnam(logname);
+
+ if (!pw && uid)
pw = getpwuid(uid);
if (!pw)
--
Please CC me when replying, I am not subscribed to kbd at lists.altlinux.org
The same patch was submited as a pull request on Github: https://github.com/legionus/kbd/pull/45
More information about the kbd
mailing list